This course will cover the best practices for using and customizing this tool, as well as how to analyze data and traffic.
Module 1: Exploring WireShark Elements and Traffic Flow
Module 2: Customize WireShark Views and Settings
Module 3: Capture Methods and Filters
Module 4: Analyzing and Exporting Specific Packets
Module 5: Reassembling Packets for Analysis
Module 6: Using the Command-line Tools for Traffic Analysis
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.