Protocol analyzers allow administrators to peer into the actual packets traveling on a network. This is very useful when trying to troubleshoot network issues or investigate security incidents. In this video, learn how cybersecurity professionals use protocol analyzers, such as Wireshark, to examine network activity.
- [Instructor] Protocol analyzers are an important tool…available to both network and security professionals.…Protocol analyzers allow administrators…to peer into the actual packets traveling on a network,…and inspect them in deep detail.…This is very useful when trying…to troubleshoot network issues…or investigate security incidents.…Protocol analyzers must be used carefully, however.…Because they can also jeopardize the confidentiality…of sensitive information…when they're used in the wrong hands.…
Let's take a look at a protocol analyzer in ;se.…We're going to use Wireshark.…The most common and free protocol analyzer.…Right here, I'm running Wireshark on a server…that runs in the cloud,…and I have an RDP session open to the system…from my laptop that's running over port 3389.…I'm going to go here and just click Start…to initiate the packet capture.…And immediately, the screen begins filling up…with lines of communication.…Each one of these lines on the screen,…and you can see, it's started scrolling already,…
Note: This course is part of a series releasing throughout 2018. A completed learning path of the series will be available once all the courses are released.
- How IP addresses are assigned and managed
- Multilayer protocols
- VPNs and VPN concentrators
- Designing secure networks
- Firewall management techniques
- Maintaining network availability
- Software defined networking (SDN)
- Port isolation
- Network attacks
- How Wi-Fi networks function
- WPA, WPS, and propagation attacks
- Host-based network security control
Skill Level Advanced
Insights from a Cybersecurity Professionalwith Mike Chapple32m 15s Intermediate
1. TCP/IP Networking
2. Network Security Devices
3. Designing Secure Networks
4. Specialized Networking
5. Secure Network Management
6. Virtualized Networks
Port isolation1m 47s
7. Network Attacks
8. Transport Encryption
9. Wireless Networking
10. Host Security
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.