1. Introduction to Network Analysis
Network analysis challenges – Nomenclature and Terminology for Wireshark 4.x
2. Collecting the Data
Configuring Wireshark
Building and optimizing configuration Profiles for data capture
Importing and Exporting Porfiles
Using capture filters to capture specific suspect traffic
Fine-Tuning Wireshark 4.x – Advanced Wireshark Profile Optimization
Remote Capture Using Wireshark 4.x
Location – How Network Infrastructure Devices Effect Ethernet Network Analysis
Hubs, Switches, Bridges, Routers, Firewalls and CSU / DSU
3. Analyzing the Data – A Sample Network Analysis Methodology
Effectively Navigating Wireshark 4.x and Interpreting Color Rules
6 Steps for practical Network Analysis of suspicious traffic
Answering the key questions – A Sample Network Analysis Methodology
Understanding and Using Shortcuts
Constructing, Using and Interpreting Color Rues in Wireshark
My Network is Slow! – Using Wireshark to Effectively Trouble Shoot Latency Issues
The Importance of Effectively Using Time Values in Troubleshooting
How Location Affects Time Values
Default vs. Specialized Time Values
Cumulative Time Value
Delta Time Value
Conversational Time Values
Expert Analysis – Introduction to Statistical Analysis and Graphing
Wireshark 4.x Updated Expert Systems
Analyzing Conversations and Activities Using Expert Systems to Determine Unusual Activity
The 6 Key Statistical Displays to Master
What’s Normal vs. Abnormal – The Role of Baseline Files
Building a Baseline Library – Where Do I go to Find Samples?
Statistical Displays vs. Graphing
Types of Graphs
I/O vs. Flow vs. TCP graphs
Show me the Money! – Display Filters and Regular Expressions
Using Wireshark 4.x Standard Display Filtering
Creating and Using Filter Buttons
Advanced Display Filters
Extending the Power of Wireshark 3.0 – Regular Expressions
4. Analysis of Network Applications and User Traffic
The Networking Protocols
What’s Normal vs. Abnormal – The Role of Baseline Files
Building a Baseline Library – Where Do I go to Find Samples?
The Key Networking Protocols and Functions
Configuration Protocols – DHCPv4
Structure and Analysis of DHCPv4
Resolving Addresses – DNS / DNSSec
Structure and Analysis of DNS
Fixing the Problem – DNSSec structure and Analysis
The Network Layer – IPv4
Structure and Analysis of IPv4
IP Options – What’s the Big Deal?
Utility and Troubleshooting Protocols – Address Resolution Protocol (ARP) and Internet Control Message Protocol (ICMPv4)
Structure and Analysis of ARP
Structure and Analysis of ICMPv4
Network Analysis Using the ICMP Analysis – Types and Codes
The Transport Layer – Moving the Data – TCP / UDP
Structure and Analysis of TCP
TCP Options – What’s the Big Deal?
TCP Analysis Using Expert Systems
Structure and Advanced Analysis of UDP
The Application Layer – Analyzing Common User Protocols
Web-Based Applications Using HTTP / HTTP 2.0
Structure and Analysis of HTTP
Response Codes – The answer to analyzing HTTP
Reassembling and Exporting of HTTP Objects
New and Improved – HTTP 2.0 – a. Structure and Analysis of HTTP 2.0
The Forgotten Part of the Internet – Usenet and NNTP
Structure and Analysis of NNTP
Response Codes – The answer to analyzing NNTP
Reassembling and Exporting of NNTP Objects
Securing the Data – SSL / TLS
Secure Socket Layer
Structure and Analysis of SSL
Response Codes – The answer to analyzing SSL
Decrypting and Reassembling of SSL Objects
Transport Layer Security
Structure and Analysis of TLS
5. Recap – Effective Troubleshooting Techniques