Welcome to Mobilarian Forum - Official Symbianize forum.

Join us now to get access to all our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, and so, so much more. It's also quick and totally free, so what are you waiting for?

CCNA Cyber Ops Tools: Working with Wireshark

OP
O 0

oaxino

Alpha and Omega
Member
Access
Joined
Nov 24, 2022
Messages
39,922
Reaction score
1,013
Points
113
Age
36
Location
japanse
grants
₲343,978
2 years of service

c9e5c2d1ba4967f07f46e53a20e03035.jpeg


CCNA Cyber Ops Tools: Working with Wireshark
Published 10/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Language: English | Duration: 36m | Size: 285 MB

Learn how to work with Wireshark and its filtering features​

What you'll learn
Downloading & Installing Wireshark
Exploring the Wiresahrk GUI & Working with Capture Filters
Working with Display Filters
Working with Coloring Rules and Saving Captures
Follow TCP Stream & Extracting Malicious Files
Requirements
Basic Knowledge of TCP/IP.
Network+ or CCENT/ICND1 level knowledge is recommended, but not required.
Description
It is estimated that there will be about 1.5 million unfilled jobs in cyber security by the year 2020. A more recent statistic increased this number for cyber security unfilled jobs to be 3.5 million by the year 2021. In addition, recent article highlights Cisco Systems intention to become a cyber security force. For these reasons, Cisco created the CCNA Cyber Ops certification, which can become one of the most certifications in demand in the near future. Furthermore, Cisco created a scholarship program for this certification, which emphasis its importance.
In this course you will learn about the tools that you can use for your study of the CCNA Cyber Ops certification and the current Cisco CyberOps Associate certification. Learning the theory side is important, but the hands on side is more important, since the main purpose of your study is to apply your knowledge in production, and since your hands on will enforce your theory knowledge. You can not teach someone how to drive a car by showing him or her how to do it, but you have to let him try and practice how to do that. Furthermore, showing you hands on labs and how to use tools without teaching you how to create these labs and install these tools, might not give you the ultimate benefit from your study . For this reason, I have created this course to teach you how to create your own home labs, and to understand the core usage and important features of the tools used in them. I believe in the saying: "Give a man a fish and you feed him for a day; teach a man to fish and you feed him for a lifetime". If you have access to online labs, such as that offered by Cisco through their scholarship, you still need to know how to create your own home labs to continue practicing and experimenting, which is what this course will help you to achieve. On the other hand, this course will prepare you to go through these online labs quickly, and with confidence, since you will be familiar with the tools used in them. And not just online labs, but any other hands on Cyber Ops courses, like what I intend to publish in the near future.
Wireshark is a network packet analyzer that displays the details of captured network traffic. It is an open source and free software that is considered the de facto standard across many commercial and non-profit enterprises, government agencies and educational institutions. And since Wireshark is an open source application, you can develop protocol dissectors for unsupported protocol, for example, and add it to Wireshark. In cybersecurity, You can use Wireshark for threat hunting in proactive incident response and for forensics in post incident response activities.
This course include the following lectures
Introduction to Wireshark
Downloading & Installing Wireshark
Exploring the Wiresahrk GUI & Working with Capture Filters
Working with Display Filters.
Working with Coloring Rules and Saving Captures
Follow TCP Stream & Extracting Malicious Files
I hope that you will join me in this course and start your Cyber security journey. Happy learning!
Who this course is for
CCNA Cyber ops and computer networking students who want to learn about hot to use Wireshark.

Screenshots

7779bf282b7bef46455004a99196ca3e.jpeg

Download link

rapidgator.net:
You must reply in thread to view hidden text.

uploadgig.com:
You must reply in thread to view hidden text.

nitroflare.com:
You must reply in thread to view hidden text.
 
K 0

KatzSec DevOps

Alpha and Omega
Philanthropist
Access
Joined
Jan 17, 2022
Messages
860,133
Reaction score
8,562
Points
83
grants
₲59,231
3 years of service
oaxino salamat sa pag contribute. Next time always upload your files sa
Please, Log in or Register to view URLs content!
para siguradong di ma dedeadlink. Let's keep on sharing to keep our community running for good. This community is built for you and everyone to share freely. Let's invite more contributors para mabalik natin sigla ng Mobilarian at tuloy ang puyatan. :)
 
Top Bottom