Wireshark University Network Training Course Full 4 DVD
Filesonic | 1.74 GB

Course Outline can be found here:
_http://www.wiresharktraining.com/Files/wsu-course_list080708.pdf
This course focuses on network forensics including capture locations, stealth-mode capture, optimal capture and display filters, validating encrypted logins, identifying reconnaissance processes, locating header and payload signatures, catching penetration tests, malware ehavior, backdoor communications and virus traffic.
Course Information:
WSU01: Wireshark Functionality and Fundamentals
Section 1: Introduction to Wireshark
Section 2: Capturing Packets
Section 3: Configuring Global Preferences
Section 4: Navigation and Colorization Techniques
Section 5: Using Time Values and Summaries
Section 6: Examining Basic Trace File Statistics
Section 7: Examining Advanced Trace File Statistics
Section 8: Creating Display Filters
Section 9: Save, Export and Print
Section 10: Expert System and Miscellaneous Tasks
Section 11: Using Command-Line Tools
WSU02: TCP/IP Network Analysis
Section 1: TCP/IP Functionality Overview
Section 2: Analyze DNS Traffic
Section 3: Analyze ARP Traffic
Section 4: Analyze IPv4 Traffic
Section 5: Analyze ICMP Traffic
Section 6: Analyze UDP Traffic
Section 7: Analyze TCP Traffic
Section 8: Analyze DHCP Traffic
Section 9: Analyze HTTP Traffic
Section 10: Analyze Telnet Traffic
Section 11: Analyze FTP Traffic
Section 12: Analyze POP Traffic
Section 13: Analyze SMTP Traffic
WSU03: Troubleshooting Network Performance
Section 1: Analyzer Placement
Section 2: Normal Network Communications
Section 3: Causes of Performance Problems
Section 4: Wireshark Functions for Troubleshooting
Section 5: Latency Issues
Section 6: Packet Loss and Retransmissions
Section 7: Misconfigurations and Redirections
Section 8: Dealing with Congestion
Section 9: Baseline Network Communications
WSU04: Network Forensics and Security
Section 1: Analyzer Placement
Section 2: Unusual Network Communications
Section 3: Reconnaissance Processes
Section 4: Analyzing ICMP Traffic
Section 5: TCP Security
Section 6: Address Spoofing
Section 7: Building Firewall ACL Rules
Section 8: Signatures of Attacks
Home:http://www.top2read.info/
Download
http://www.filesonic.com/folder/16129145
Mirror For Japan, EU, UAE, China, Au, Ru, SA, Brazil and Sing…
http://www.filesonic.com/file/4055293714/sevno.org_wireshark university network training.part1.rar
http://www.filesonic.com/file/4055296894/sevno.org_wireshark university network training.part2.rar
http://www.filesonic.com/file/4055337324/sevno.org_wireshark university network training.part3.rar
http://www.filesonic.com/file/4055320814/sevno.org_wireshark university network training.part4.rar