[FTUForum.Com] [UDEMY] Start Using Wireshark To Hack Like A Pro [FTU]

Torrent Details


[FTUForum.com] [UDEMY] Start Using Wireshark to Hack like a Pro [FTU]

NAME
[FTUForum.com] [UDEMY] Start Using Wireshark to Hack like a Pro [FTU].torrent
CATEGORY
Other
INFOHASH
9207f5f584c4ae17ae8fc228afa5adc9755b2e92
SIZE
839 MB in 80 files
ADDED
Uploaded on 24-07-2019 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

For More Udemy Free Courses >>> https://ftuforum.com/

For more Lynda and other Courses >>> https://www.freecoursesonline.me/

Our Forum for discussion >>> https://discuss.ftuforum.com/







Start your first capture, use Wireshark features to understand the data and analyze the network communication



BESTSELLER



Created by: Kevin Cardwell

Last updated: 3/2018

Language: English

Caption (CC): Included

Torrent Contains: 85 Files, 11 Folders

Course Source: https://www.udemy.com/start-using-wireshark-to-hack-like-a-pro/



What you'll learn



• Get to know the key features of Wireshark

• Recognize the essential components of network communication

• Explore the different methods of setting up a packet capture

• Analyze packets using the Wireshark tool

• Analyze client to server communication with Wireshark

• Examine network traffic and identify potentially malicious traffic

• Examine the data within the network and how it shows up in Wireshark



Course content

all 35 lectures 03:30:12



Requirements



• This course is for you if you have a basic understanding of the command line and general knowledge of what an IP address is and TCP/IP. You should also know about the 7 layers of OSI model.



Description



This course will cover the process for conducting protocol analysis. This will serve as a foundation for the skill required for a number of different types of careers. Protocol analysis is the technique of analyzing what is or has taken place on a network. This is used by Security Operations Center analysts as well as network forensics investigators.



We will take static capture files that you will be provided and show you how to analyze them within the Wireshark tool. You will learn ways to quickly identify anything that is abnormal within a network packet capture. This will provide you with the initial skills for intrusion analysis, and also malware tracking and monitoring.



-The course prepares the student for understanding network protocol analysis -After the course you will have the initial skills for security or hacking classes



- Anyone who wants to understand the foundation of security skills and have knowledge for analyzing network traffic as well as potential intrusions will benefit from this course.



- This course is for beginners or people interested in learning about hacking and don't know where to start.



Who this course is for:



• This course is for beginners or people interested in learning about hacking and don't know where to start.







Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
0. Websites you may like/How you can help Team-FTU.txt237 B
1. Course Overview/1. Introduction.mp413.7 MB
1. Course Overview/1. Introduction.vtt1.7 KB
10. Section 10 The Steps of Professional Hacking/1. The first step of professional hacking scanning methodology!.mp49.8 MB
10. Section 10 The Steps of Professional Hacking/1. The first step of professional hacking scanning methodology!.vtt5.2 KB
10. Section 10 The Steps of Professional Hacking/2. The second step of the professional hacking methodology.mp416 MB
10. Section 10 The Steps of Professional Hacking/2. The second step of the professional hacking methodology.vtt7.7 KB
10. Section 10 The Steps of Professional Hacking/3. The third step of the professional hacking methodology.mp45.5 MB
10. Section 10 The Steps of Professional Hacking/3. The third step of the professional hacking methodology.vtt3.7 KB
10. Section 10 The Steps of Professional Hacking/4. The fourth step of the professional hacking methodology.mp424.2 MB
10. Section 10 The Steps of Professional Hacking/4. The fourth step of the professional hacking methodology.vtt9 KB
10. Section 10 The Steps of Professional Hacking/5. The fifth step of the professional hacking methodology.mp423.1 MB
10. Section 10 The Steps of Professional Hacking/5. The fifth step of the professional hacking methodology.vtt9.1 KB
10. Section 10 The Steps of Professional Hacking/6. The sixth step of the professional hacking methodology.mp488.4 MB
10. Section 10 The Steps of Professional Hacking/6. The sixth step of the professional hacking methodology.vtt9.6 KB
10. Section 10 The Steps of Professional Hacking/7. Lecture 35 File extraction using Wireshark.mp4191 MB
10. Section 10 The Steps of Professional Hacking/7. Lecture 35 File extraction using Wireshark.vtt11.2 KB
2. Course Setup First Steps of Protocol Analysis/1. Download and Install Wireshark.mp46.5 MB
2. Course Setup First Steps of Protocol Analysis/1. Download and Install Wireshark.vtt3.9 KB
2. Course Setup First Steps of Protocol Analysis/2. Work with Wireshark.mp410.3 MB
2. Course Setup First Steps of Protocol Analysis/2. Work with Wireshark.vtt8.6 KB
2. Course Setup First Steps of Protocol Analysis/3. Review the First Packet capture in Wireshark..mp414.4 MB
2. Course Setup First Steps of Protocol Analysis/3. Review the First Packet capture in Wireshark..vtt6.8 KB
2. Course Setup First Steps of Protocol Analysis/3.1 File1.pcapng.pcapng7.3 MB
3. Network Communication at the Packet Level/1. Introduction.mp48 MB
3. Network Communication at the Packet Level/1. Introduction.vtt6.3 KB
3. Network Communication at the Packet Level/2. Analyze Client to Server Communication with the Wireshark User Interface..mp419.6 MB
3. Network Communication at the Packet Level/2. Analyze Client to Server Communication with the Wireshark User Interface..vtt7.5 KB
3. Network Communication at the Packet Level/3. Your first protocols.mp47.8 MB
3. Network Communication at the Packet Level/3. Your first protocols.vtt5.8 KB
3. Network Communication at the Packet Level/4. Examine protocol packets within the Wireshark tool..mp415.9 MB
3. Network Communication at the Packet Level/4. Examine protocol packets within the Wireshark tool..vtt7.1 KB
3. Network Communication at the Packet Level/5. Network communication quiz.html146 B
4. TCPIP Foundation/1. Introduction.mp46.6 MB
4. TCPIP Foundation/1. Introduction.vtt5 KB
4. TCPIP Foundation/2. Protocol Analysis at the network level using Wireshark.mp49.8 MB
4. TCPIP Foundation/2. Protocol Analysis at the network level using Wireshark.vtt4.9 KB
4. TCPIP Foundation/2.1 File2.zip.zip5.9 KB
4. TCPIP Foundation/3. Interpreting Connections and Protocols.mp43.8 MB
4. TCPIP Foundation/3. Interpreting Connections and Protocols.vtt2.5 KB
4. TCPIP Foundation/4. Intermediate Protocol Analysis of static captures using Wireshark..mp48.6 MB
4. TCPIP Foundation/4. Intermediate Protocol Analysis of static captures using Wireshark..vtt4.5 KB
4. TCPIP Foundation/4.1 File3.pcapng.pcapng2.2 MB
4. TCPIP Foundation/5. TCPIP Foundation Quiz.html146 B
5. Starting your First Capture/1. Introduction.mp44.4 MB
5. Starting your First Capture/1. Introduction.vtt3.4 KB
5. Starting your First Capture/2. Live capture exercise.mp420.5 MB
5. Starting your First Capture/2. Live capture exercise.vtt7.9 KB
5. Starting your First Capture/3. Analyzing the live capture using Wireshark..mp436.5 MB
5. Starting your First Capture/3. Analyzing the live capture using Wireshark..vtt11.2 KB
6. Working with Capture Files in Wireshark/1. Introduction.mp45.3 MB
6. Working with Capture Files in Wireshark/1. Introduction.vtt3.8 KB
6. Working with Capture Files in Wireshark/2. Saving the capture to a file.mp424.1 MB
6. Working with Capture Files in Wireshark/2. Saving the capture to a file.vtt5.6 KB
6. Working with Capture Files in Wireshark/3. Advanced Capture Methods.mp45 MB
6. Working with Capture Files in Wireshark/3. Advanced Capture Methods.vtt3.6 KB
6. Working with Capture Files in Wireshark/4. Advanced Capture Scenario Analysis Methods With Wireshark..mp428.8 MB
6. Working with Capture Files in Wireshark/4. Advanced Capture Scenario Analysis Methods With Wireshark..vtt6.2 KB
6. Working with Capture Files in Wireshark/5. Working with capture files within Wireshark.html146 B
7. Analyzing Packet Captures/1. Introduction.mp43.8 MB
7. Analyzing Packet Captures/1. Introduction.vtt2.9 KB
7. Analyzing Packet Captures/2. Creating Wireshark filters.mp411.6 MB
7. Analyzing Packet Captures/2. Creating Wireshark filters.vtt5.8 KB
8. Examining Protocol Communication/1. Introduction.mp414 MB
8. Examining Protocol Communication/1. Introduction.vtt9.3 KB
8. Examining Protocol Communication/2. Attacking the network communication and identifying artifacts with Wireshark.mp418.2 MB
8. Examining Protocol Communication/2. Attacking the network communication and identifying artifacts with Wireshark.vtt8.7 KB
8. Examining Protocol Communication/3. Applying your skills to identify potential incidents within Wireshark captures.mp439.4 MB
8. Examining Protocol Communication/3. Applying your skills to identify potential incidents within Wireshark captures.vtt16.6 KB
8. Examining Protocol Communication/3.1 File4.zip.zip224.1 KB
9. Bonus Capture Files/1. Bonus-File1 capture file.mp44.6 MB
9. Bonus Capture Files/1. Bonus-File1 capture file.vtt2.5 KB
9. Bonus Capture Files/1.1 bonus-file1.zip.zip96.6 KB
9. Bonus Capture Files/2. Bonus-File1 Solution.mp444.5 MB
9. Bonus Capture Files/2. Bonus-File1 Solution.vtt14.1 KB
9. Bonus Capture Files/3. Bonus File2 capture File.mp47.1 MB
9. Bonus Capture Files/3. Bonus File2 capture File.vtt1.5 KB
9. Bonus Capture Files/3.1 Bonus-File2.zip.zip7.3 MB
9. Bonus Capture Files/4. Bonus-File2 Solution.mp470.9 MB
9. Bonus Capture Files/4. Bonus-File2 Solution.vtt23.7 KB

Alternative Torrents for 'FTUForum.com UDEMY Start Using Wireshark to Hack like Pro FTU'.

There are no alternative torrents found.