Sniffing – Tracing – Protocol Analysis (WSSTPA)

Sniffing – Tracing – Protocol Analysis (WSSTPA)

About Education 

This course provides in-depth knowledge and hands-on experience in Wireshark® and TCP/IP communication analysis. By learning how to use Wireshark, participants will gain the ability to identify the most common performance problems in TCP/IP communications. The course covers topics such as network traffic capture techniques, analyzer placement, filtering, profiling, color conventions, graphing, interpreting protocol fields, and basic TCP/IP communication functionality. It teaches the normal behavior of ARP, DNS, IP, TCP, UDP, ICMP, HTTP/HTTPS protocols, as well as how to detect latency issues, connection establishment concerns, denial of service, and signs of security compromise. 

 

Prerequisites 

Although there are no prerequisites, knowledge of TCP/IP networking fundamentals, network devices, and basic network protocols is helpful. 

 

Duration of Training 

  • Instructor-led training: 5 days (with hands-on lab work) 
  • Virtual instructor-led training: 5 days (with web-based lectures and hands-on labs) 

 

Who Should Participate? 

Suitable for anyone who wants to analyze network traffic and troubleshoot problems by optimizing TCP/IP networks. 
Especially: 

  • Network engineers 
  • Information technology experts 
  • Security analysts 

 

Educational Content 

Chapter 1: Introduction to the World of Network Analysis 

  • Network analysis and basic concepts 

Chapter 2: Introduction to Wireshark 

  • Wireshark interface and basic features 

Chapter 3: Traffic Capture 

  • Capture techniques and analyzer placement 

Chapter 4: Creating and Applying Capture Filters 

Chapter 5: Defining Global and Personal Preferences 

Chapter 6: Traffic Coloring 

  • Color rules and customization 

Chapter 7: Defining Time Values ​​and Interpreting Summaries 

Chapter 8: Interpreting Basic Trace File Statistics 

Chapter 9: Creating and Applying Image Filters 

Chapter 10: Tracing Streams and Reconstructing Data 

Chapter 11: Customizing Wireshark Profiles 

Chapter 12: Annotating, Saving, Exporting, and Printing Packages 

Chapter 13: Using the Wireshark Expert System 

Chapter 14: TCP/IP Analysis Overview 

Chapters 15-24: Protocol Analysis 

  • DNS, ARP, IPv4/IPv6, ICMP, UDP, TCP, DHCP, HTTP, FTP and Email traffic analysis 

Chapter 25: Introduction to 802.11 (WLAN) Analysis 

Chapter 26: Introduction to Voice over IP (VoIP) Analysis 

Chapter 27: Identifying Typical Traffic Patterns 

Chapter 28: Finding the Root Causes of Performance Issues 

Chapter 29: Network Forensics Overview 

Chapter 30: Identifying Scanning and Discovery Processes 

Chapter 31: Analyzing Suspicious Traffic 

 

What You Will Gain at the End of Training 

Participants who complete this training will: 

  • Using Wiresharkeffectively, it can detect network performance issues. 
  • It can interpret traffic behavior by performing protocol analysis. 
  • Diagnose network problems and develop solutions. 
  • Can specialize in network security and performance analysis. 
Trainings

View more trainings

Contact Us

Write Your Requirements and We Will Contact You

We are happy to answer your questions and help you determine which of our services best suits your needs.

Advantages
Then what happens?
1

We will schedule a call at your convenience

2

We are having an exploratory and advisory meeting

3

We are preparing an offer

Consult Us