Curso Wireshark TCP/IP Analysis and Troubleshooting with Wireshark
32 horasVisão Geral
Curso Wireshark TCP/IP Analysis and Troubleshooting with Wireshark. A análise e otimização de rede eficazes abrangem não apenas as habilidades de capturar dados, mas também a capacidade de discernir os principais padrões ocultos no fluxo de tráfego de rede. Este curso fornecerá ao aluno um conjunto de técnicas de investigação e análise com foco no uso de ferramentas de código aberto neutras em relação ao fornecedor, como o Wireshark, para fornecer informações sobre as seguintes áreas:
– Configuração de software especializada e técnicas de captura de pacotes usando Wireshark 3.0
– Comportamento, análise e reconhecimento de ameaças para vários protocolos de usuário padrão versão 4, incluindo IP, DHCP, TCP, UDP, DNS, ICMP, ARP e protocolos de usuário comuns baseados na Internet, como HTTP / HTTP 2.0 / NNTP
– Técnicas especializadas de filtragem e análise, incluindo reconstrução e visualização do tráfego de dados
Exemplos do mundo real serão utilizados ao longo do curso em conjunto com vários exercícios práticos para fornecer habilidades de análise prática comprovadas em campo. Os participantes receberão um guia do aluno, incluindo vários arquivos de referência e ferramentas forenses e de rede, bem como uma biblioteca de documentos de referência.
Publico Alvo
Projetado para o pessoal de rede, governo e segurança que precisa desenvolver habilidades de investigação de pacotes e otimização de rede; este curso abrange as principais habilidades do Wireshark, como configuração de software personalizado, captura de pacotes e técnicas de análise.
As principais áreas de estudo incluem: Comportamento de protocolo, análise e reconhecimento de ameaças para vários protocolos de usuário críticos, incluindo IPv4, DHCPv4, TCP, UDP, DNS, ICMPv4, bem como protocolos de usuário comuns baseados na Internet, como HTTP. Ênfase específica em técnicas especializadas de análise do mundo real, incluindo reconstrução de tráfego de dados.
A conclusão bem-sucedida deste curso fornecerá a esses indivíduos um caminho para os campos de análise de rede e forense.
Materiais
Inglês + Exercícios + Lab PraticoConteúdo Programatico
- Introduction to Network Analysis
- Network analysis challenges – Nomenclature and Terminology for Wireshark 3.0
- Collecting the Data
- Configuring Wireshark
- Building and optimizing configuration Profiles for data capture
- Importing and Exporting Porfiles
- Using capture filters to capture specific suspect traffic
- Fine-Tuning Wireshark 3.0 – Advanced Wireshark Profile Optimization
- Remote Capture Using Wireshark 3.0
- Location – How Network Infrastructure Devices Effect Ethernet Network Analysis
- Hubs, Switches, Bridges, Routers, Firewalls and CSU / DSU
- Analyzing the Data – A Sample Network Analysis Methodology
- Effectively Navigating Wireshark 3.0 and Interpreting Color Rules
- 6 Steps for practical Network Analysis of suspicious traffic
- Answering the key questions – A Sample Network Analysis Methodology
- Understanding and Using Shortcuts
- Constructing, Using and Interpreting Color Rues in Wireshark 3.0
- 6 Steps for practical Network Analysis of suspicious traffic
- My Network is Slow! – Using Wireshark 3.0 to Effectively Trouble Shoot Latency Issues
- The Importance of Effectively Using Time Values in Troubleshooting
- How Location affects Time Values
- Default vs. Specialized Time Values
- Cumulative Time Value
- Delta Time Value
- Conversational Time Values
- The Importance of Effectively Using Time Values in Troubleshooting
- Expert Analysis – Introduction to Statistical Analysis and Graphing
- Wireshark 3.0 Updated Expert Systems
- Analyzing Conversations and Activities Using Expert Systems to Determine Unusual Activity
- The 6 Key Statistical Displays to Master
- What’s Normal vs. Abnormal – The Role of Baseline Files
- Building a Baseline Library – Where Do I go to Find Samples?
- Statistical Displays vs. Graphing
- Types of Graphs
- I/O vs. Flow vs. TCP
- Types of Graphs
- The 6 Key Statistical Displays to Master
- Show me the Money! – Display Filters and Regular Expressions
- Using Wireshark 3.0 Standard Display Filtering
- Creating and Using Filter Buttons
- Advanced Display Filters
- Extending the Power of Wireshark 3.0 – Regular Expressions
- Using Wireshark 3.0 Standard Display Filtering
- Effectively Navigating Wireshark 3.0 and Interpreting Color Rules
- Analysis of Network Applications and User Traffic
- The Networking Protocols
- What’s Normal vs. Abnormal – The Role of Baseline Files
- Building a Baseline Library – Where Do I go to Find Samples?
- The Key Networking Protocols and Functions
- Configuration Protocols – DHCPv4
- Structure and Analysis of DHCPv4
- Resolving Addresses – DNS / DNSSec
- Structure and Analysis of DNS
- Fixing the Problem – DNSSec structure and Analysis
- The Network Layer – IPv4
- Structure and Analysis of IPv4
- IP Options – What’s the Big Deal?
- Utility and Troubleshooting Protocols – Address Resolution Protocol (ARP) and Internet Control Message Protocol (ICMPv4)
- Structure and Analysis of ARP
- Structure and Analysis of ICMPv4
- Network Analysis Using the ICMP Analysis – Types and Codes
- The Transport Layer – Moving the Data – TCP / UDP
- Structure and Analysis of TCP
- TCP Options – What’s the Big Deal?
- TCP Analysis Using Expert Systems
- Structure and Advanced Analysis of UDP
- The Application Layer – Analyzing Common User Protocols
- Web-Based Applications Using HTTP / HTTP 2.0
- Structure and Analysis of HTTP
- Response Codes – The answer to analyzing HTTP
- Reassembling and Exporting of HTTP Objects
- New and Improved – HTTP 2.0 – a. Structure and Analysis of HTTP 2.0
- The Forgotten Part of the Internet – Usenet and NNTP
- Structure and Analysis of NNTP
- Response Codes – The answer to analyzing NNTP
- Reassembling and Exporting of NNTP Objects
- Web-Based Applications Using HTTP / HTTP 2.0
- Securing the Data – SSL / TLS
- Secure Socket Layer
- Structure and Analysis of SSL
- Response Codes – The answer to analyzing SSL
- Decrypting and Reassembling of SSL Objects
- Transport Layer Security
- Structure and Analysis of TLS
- Secure Socket Layer
- Configuration Protocols – DHCPv4
- Recap – Effective Troubleshooting Techniques
- The Networking Protocols
- Supplemental Resources
- Appendix “A” – Useful Stuff
- Appendix “B” – Book List: Recommended Reading
- Appendix “C” – Wireshark Command Line Program User Guides
- Appendix “D” – Wireshark USB Capture Guide
- Where do I go From Here? – Continuing Your Wireshark Education
- Wireshark 0 – TCP/IP Networking Fundamentals Using Wireshark
- Wireshark 1 – TCP/IP Troubleshooting & Network Optimization Using Wireshark 3.0
- Wireshark 2 – Advanced Network and Security Analysis
- Wireshark 3 – Network Forensics Analysis
- Wireshark 4 – Mobile Device Forensics Analysis
- Wireshark 5 – Cloud and Internet of Things (IoT) Advanced Network Analysis
- Wireshark 6 – VoIP Advanced Network Analysis
- Wireshark 7 – WiFi Advanced Network Analysis
- Wireshark 8 – SCADA and ICS Advanced Network Analysis