- Trends in cyberattacks
- Preventing system compromise
- Analyzing packets
- Using Wireshark
- Creating firewall rules
- Baselining a network
- Using capture filters
- Using a ring buffer
- Handling OSI layer attacks
- Identifying attack signatures
- Using VirusTotal
- Handling unwanted TOR activity
Skill Level Intermediate
- [Lisa] It's no secret that routinely examining network traffic is important in an organization as part of an overall security framework. In this course, you'll learn how to examine network traffic using Wireshark. I'll show you how to uncover advanced persistent threats on a network that elude detection and hide in plain sight. We'll take a look at coloring rules to highlight potential malware signatures. We'll examine unusual traffic so you can recognize indications of compromise. We'll also discuss ports associated with malware and I'll show you some common attack signatures. Hello, I'm Lisa Bock and I'm a security ambassador. I'm super excited that you can join me for Wireshark, Malware, and Forensics. If you're ready to learn what to look for when trying to uncover potential problems on your own network, then let's get started.
1. Recognizing Today's Threats
2. Diving into the Network
3. Examining Unusual Traffic
4. Case Studies
Next steps1m 12s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.