Hands-On Packet Analysis

Hands-On Packet Analysis

.MP4, AVC, 1920x1080, 30 fps | English, AAC, 2 Ch | 2h 18m | 534 MB

Instructor: Sunil Gupta
Packet capturing and analysis to safeguard your network

Work on a wide range of network traffic scenarios to detect congestions in your network
Use various packet-capturing tools to search and filter your data
Build customized capture and display filters
Capture and analyze encrypted traffic
Perform critical troubleshooting to analyze the performance of your network

As your network experiences increases in traffic, the service-associated risks also increase. Packet analysis aims to capture, read, and interpret "packets" within your environments. Not just that, it also helps to verify live communications and implement real-time monitoring within your network.

This course supplies a wide range of tools to analyze your network issues-from losing connectivity to low-speed problems-and shows you ways to upgrade your network performance. You will also investigate modern exploits and malware issues at the packet level. You will learn to apply graph traffic patterns to visualize data flowing across your network. You will work with a powerful tool, Wireshark, and use its features to find hidden bottlenecks in your network. Finally, you'll compile statistics to analyze the performance of your network packets.

By the end of this course, you will have enhanced your network analysis skills and will be able to perform critical analysis and interpretation of data that crosses your network.

Explore various packet-capturing scenarios to identify roadblocks in your network
Gain a wide range of techniques to capture and analyze network traffic
Get to work with the finest range of tools and techniques for packet analysis



[Fast Download] Hands-On Packet Analysis

Related eBooks:
Advanced Parallel Processing Technologies
CEH v10 Certified Ethical Hacker Study Guide
Malware Analysis: Identifying and Defeating Packing
Cisco Firepower Fundamentals
Offline Application Security Testing Essential Training
Advances in Digital Forensics XV
Applications and Techniques in Information Security
Bulletproof Wireless Security: GSM, UMTS, 802.11, and Ad Hoc Security
Applied Network Security
Computer Aided Fraud Prevention and Detection: A Step by Step Guide
Security Administrator Street Smarts: A Real World Guide to CompTIA Security Skills
Applied Cryptanalysis: Breaking Ciphers in the Real World
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.