Protocol analyzers allow administrators to peer into the actual packets traveling on a network. This is very useful when trying to troubleshoot network issues or investigate security incidents. Learn how cybersecurity professionals use protocol analyzers, such as Wireshark, to examine network activity.
- [Instructor] Protocol analyzers are an important tool…available to both network and security professionals.…Protocol analyzers allow administrators to peer…into the actual packets travelling on a network…and inspect them in deep detail.…This is very useful when trying to troubleshoot…network issues or investigate security incidents.…Protocol analyzers must be used carefully, however,…because they can also jeopardize the confidentiality of…sensitive information when they're used in the wrong hands.…
Let's take a look at a protocol analyzer in use.…We're going to use Wireshark, the most common…and free protocol analyzer.…Right here I'm running Wireshark on a server…that runs on a cloud.…And I have an RDP session open to the system…from my laptop that's running over port 3389.…I'm going to go here and just click start…to initiate the packet capture.…And immediately the screen begins filling up…with lines of communication.…Each one of these lines on the screen,…and you can see it's started scrolling already,…there's so many of these.…
Learn about communication and networking best practices, including TCP/IP networking, network security devices, and secure network design and management. Instructor and cybersecurity expert Mike Chapple also includes coverage of converged protocols, network encryption, and wireless networking. You can find Mike's companion study books for this series at the Sybex test prep site and review the complete CISSP Body of Knowledge at https://www.isc2.org/cissp-domains/default.aspx.
- IP addressing
- Switches and routers
- Content distribution networks
- Designing secure networks
- Specialized networking
- Managing secure networks
- Working with virtualized networks like SDNs
- Detecting and preventing network attaches
- Transport encryption
- Wireless networking
- Host security
Skill Level Advanced
CISSP Cert Prep: 2 Asset Security (2015)with Mike Chapple58m 11s Advanced
1. TCP/IP Networking
2. Network Security Devices
3. Designing Secure Networks
4. Specialized Networking
5. Secure Network Management
6. Virtualized Networks
Port isolation1m 47s
7. Network Attacks
8. Transport Encryption
9. Wireless Networking
10. Host Security
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.