This 3-day workshop focuses on capturing, filtering, and analyzing network traffic to identify security vulnerabilities, track down network intrusions, troubleshoot network issues, and perform network forensics.
Overview
This course includes real-world, hands-on scenarios featuring packet captures from network attacks and forensics investigations. Students learn how to reconstruct network intrusions and extract information, such as credentials, images, malware, and indicators of compromise (IOCs) from packet capture files. Students also learn how to piece together and extract network evidence and tie the evidence to a suspect.
Wireshark is the primary tool used throughout this course, but other tools and techniques are covered as well.
Intended Audience
This course is recommended for team members who:
-
Perform malware analysis
-
Perform penetration testing
-
Troubleshoot network applications or network latency
-
Track down infected users and top bandwidth consumers
-
Perform incident response
Outline
The following topics are covered in this course:
- Network and traffic analysis basics
- Wireshark overview and use
- Working with captured packets – lower-level protocols
- Working with captured packets – higher-level protocols
- Real-world scenarios
- Protocol dissection
Prerequisites
We recommend students have general knowledge of TCP/IP, networking, and the OSI Model, as well as exposure to networking protocols and technologies, such as DNS, DHCP, ICMP, FTP, HTTP, SMTP, and ARP.
Duration & Format
3 days (21 hours)
This course is conducted live, in-person by Alpine Security at its training facility in the St. Louis, Missouri, metro area.
Professional Training for Modern Technology Teams
Open Enrollment Courses
Open enrollment courses are a great, cost-effective option for organizations that have an immediate need to train a small number of employees.
Customized Training Programs
Customized training programs can be delivered on-site, in our training lab, or online to help organizations enhance the skills of their internal development teams.