Categories

There are currently no items in your shopping cart.

User Panel

Forgot your password?.

Wireshark: Malware and Forensics


Introduction
Welcome
What you should know

1. Deep Packet Analysis
Cyberattacks and trends
Malware and compromised systems
Packet analysis overview
Wireshark overview
Tshark
Tap into your network
Create firewall rules

2. Capture Overview
Baseline your network
Display filters
Capture filters
Statistics
Save, export, and print
Coloring rules
Using a ring buffer
Challenge: HTTP packets
Solution: HTTP packets

3. Unusual Traffic
OSI layer attacks
Indications of compromise
Ports related to malicious activity
Attack signatures
Using VirusTotal
Challenge: Analyze
Solution: Analyze

4. Case Studies
Fast flux DNS
Trojan in the house
Unwanted TOR activity
Challenge: Packets and filters
Solution: Packets and filters

Conclusion
Next steps

You Have Got Gift 25% OFF

Use this Coupon Code “J3JKN396