• Our resources on Theme5s Forum are CLEAN and SAFE. So you can use them for development and testing purposes. If your are on Windows and have an antivirus that alerts you about a possible infection: Know it's a false positive because all scripts are double checked by our experts. We advise you to add Theme5s to trusted sites/sources or disable your antivirus momentarily while downloading a resource. "Enjoy your presence on Theme5s"

Udemy Wireshark: packet analysis and ethical hacking: core skills


Staff member

Wireshark: Packet Analysis and Ethical Hacking: Core Skills

From basic to advanced network analysis using Wireshark! Ethical Hacking using Kali Linux: Passwords, Security, Protocol
What you'll learn
  • Learn how to troubleshoot networks using Wireshark.
  • Capture VoIP, OSPF, HTTP, Telnet and many other protocols using Wireshark.
  • Learn how to use Wireshark for Ethical hacking.
  • Improve your job prospects by adding Wireshark to your resume.
  • Understand and interpret network protocols.
  • Hack Network Protocols using Kali Linux
Learn Wireshark practically. Wireshark pcapng files provided so you can practice while you learn! There is so much to learn in this course:
- Capture Telnet, FTP, TFTP, HTTP passwords.
- Replay VoIP conversations.
- Capture routing protocol (OSPF) authentication passwords.
- Troubleshoot network issues.
- Free software.
- Free downloadable pcapng files.
- Answer quiz questions.
The course is very practical. You can practice while you learn!
Learn how to analyze and interpret network protocols and leverage Wireshark for what it was originally intended: Deep Packet Inspection and network analysis.
I also show you have to hack network protocols using Kali Linux! Hack network protocols like DTP, VTP, STP and DHCP using Ethical hacking tools included in Kali Linux.
Updates: Now includes Python scripting to automatically capture packets from the network using tshark. Lean how to automate your captures and learn how to hack the network using Python and Wireshark.
Protocols we capture and discuss in this course include:
- Telnet
- VoIP
Who this course is for:
  • Network Engineers
  • Network Architects
  • Ethical hackers
  • Networking Students

Reply by Facebook account

Similar threads

New resources