WiFi & Wireless Network Analysis Using Wireshark

This course is for Networking and Security personnel who must develop packet investigation techniques by studying the WiFi and Wireless Networking Protocols (IEEE 802.11a, b, g, n, ac, ad, az) using Wireshark and other Open-Source Analysis tools. It gives the Engineer the key WiFi / Wireless Network Analysis skills to capture the correct WiFi data […]
Cloud-based Network Analysis & Troubleshooting

This course is for Networking and Security personnel who need to develop a set of packet investigation techniques to support recognition, analysis, and threat recognition for many of the next generation Cloud technologies, including Cloud Computing / Virtualization Industrial Control Systems and related networking Protocols using Wireshark, Stratoshark, and other Open-Source Analysis tools. Stratoshark is a […]
Internet of Things (IoT) Network Analysis

This course is for Networking and Security personnel who need to develop packet investigation techniques by studying the IoT and Home Automation Protocols using Wireshark and other OpenSource Analysis tools. Successful completion of this course provides these individuals with a pathway into the Network and Forensics Analysis field. Practical analysis and troubleshooting of such advanced […]
TCP/IP Analysis and Troubleshooting with Wireshark

Effective Network TCP/IP Analysis and Optimization encompasses the skills of not only capturing data, but also the ability to discern the key patterns hidden within the flood of network traffic. This course will provide the student with a set of investigate and analysis techniques focusing on the use of vendor-neutral, Open-Source Tools such as Wireshark […]
Masterclass – Advanced Network & Intro to Security Analysis

The realities of modern traffic analysis require interpreting encrypted network traffic correctly. A detailed knowledge of how key protocols such as HTTP can provide valuable insights into what is happening in a suspect traffic capture. This workshop provides an introduction to techniques for the evaluation of encrypted traffic using open-source tools such as Wireshark to […]