Wireshark: Malware and Forensics

Wireshark: Malware and Forensics

Duration: 2h 7m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch |301 MB

Genre: eLearning | Language: English
Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.

Topics include:

Trends in cyberattacks
Preventing system compromise
Analyzing packets
Using Wireshark
Creating firewall rules
Baselining a network
Using capture filters
Using a ring buffer
Handling OSI layer attacks
Identifying attack signatures
Using VirusTotal
Handling unwanted TOR activity

More Info



[Fast Download] Wireshark: Malware and Forensics

Related eBooks:
Detecting Trust and Deception in Group Interaction
Identified Flying Objects: A Multidisciplinary Scientific Approach to the UFO Phenomenon
Big Data Surveillance and Security Intelligence: The Canadian Case
Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global
Computer Security: Principles and Practice Ed 4
Self-defense essentials for women: Hands off! Fight back offenders with simple and effective techniq
Applied Cryptanalysis
Learning Tor and the Dark Web
Cisco Network Security Little Black Book
Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard
How to Cheat at Configuring Open Source Security Tools
Ansible for Beginners
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.