Network Analysis and Trouble Shooting Using Wireshark

A short course which introduces the student to an open source software, Wireshark which is a widely used network protocol analyzer

  • Domain : ELECTRONICS
Enroll Now View demo

A Quick Overview

The course “Network Analysis and Trouble Shooting using Wireshark” is an intermediate level course focused on the Wireshark software, which is an open-source tool for packet capture and analysis. The course, firstly, provides the complete introduction to the Wireshark tool, as well as other packet capturing tools such as dumpcap, tcpdump and tshark. Secondly, it explains, how packet capturing works and what are the different ways to use these tools. Lastly, the course focuses on the methodology of performing packet analysis with hands-on analysis of networking and telecom protocols and real-world troubleshooting with some fault scenarios.


GET COURSE COUNSELLING TODAY

Get a 1-on-1 demo to understand what is included in the course and how it can benefit you from an experienced sales consultant. The demo session will help you enroll in this course with a clear vision and confidence.

Request a Demo Session

COURSE SYLLABUS

1Introduction to WireShark

  • Layers of OSI & TCP/IP Model
  • Understand the working of Wireshark
  • Use Wireshark to capture the traces
  • Analyze L1/L2 protocols using Wireshark

2Advance Usage

  • Log Analysis with Wireshark
  • Capturing & Filtering the logs
  • Capturing Traces from the command line
  • L3/L4 Analysis

3Capturing and Debugging WIFI Logs

  • Understanding the WIFI Protocols
  • Capturing WiFi Traffic
  • Debugging Networking Issues
  • Application layer Protocol Analysis for protocols DNS/DHCP/HTTP/SIP

4Capturing and Debugging Mobile network logs

  • Understanding LTE Network
  • Capturing Mobile Network Logs
  • Analyzing the Logs
  • Protocols covered - SCTP / S1AP / X2AP


Projects Overview

A variety of projects to demonstrate the learnings of the course

Highlights

Overview

The project assignment is a set of options that the course taker needs to complete in order to demonstrate the learnings from this course. There are multiple challenges and the student needs to opt for one of the challenges and follow the instruction to complete the assignment.

 

1. Creating a honey pot and analysing traffic

In this exercise students should create a honeypot. The Hotspot Honeypot is a free Wi-Fi access point to lure users to connect to it. It tricks the wireless users into connecting their laptops or mobile phones to these fake hotspots by masquerading as a legitimate one. Once the victim has connected, the cyberattacker may launch man-in-the-middle attacks which allows him to record all of your Internet activities in an effort to steal your bank details by using a spoofed website.
Please note that the WIFI network should be only used for network analysis and no personal information should be captured. It is recommended that the student performs it on a test device, using their own device enacting as victim.No packet capture should be done on third party users who are not aware of being monitored. Filters to be used for the analysis of specific protocols.It is expected that the student perform.

2. Prepare report on comparison of two networks performance.

In this exercise students should have two networks available for testing. The idea is to compare the performance of both the networks in terms of security, latency, supported features and throughput. Students can select any destination website or server to perform the testing.Filters to be used for the analysis of specific protocols.

3. Prepare a report on analysis of any one of the Application protocol

In this exercise, students are expected to perform performance and security analysis of any one of the application protocols of students choice. The report should contain

  • The complete information regarding the protocol
  • The call flow of the mentioned protocol, involving the transport layer protocols and its implementation
  • The performance issues / bottlenecks regarding the protocols.
  • Security analysis regarding the potential threats and ways to overcome them
  • Captures, of the application layer protocol showing the unsecured and secured operation

 

 


WHO IS THIS COURSE FOR ?


  • Students with a basic understanding of networking protocols. OSI model of networking , TCP/IP model of networking.

SOFTWARE COVERED

Wireshark, Tshark, Dumpcap, TCPdump

Wireshark is the world's foremost and widely-used network protocol analyzer. It lets you see what's happening on your network at a microscopic level and it is standard across many commercial and non-profit enterprises, government agencies, and educational institutions.

Dumpcap is a network traffic dump tool. It lets you capture packet data from a live network and write the packets to a file. Dumpcap 's default capture file format is pcapng format.

TShark will use the pcap library to capture traffic from the first available network interface and displays a summary line on the standard output for each received packet.

tcpdump is a data-network packet analyzer computer program that runs under a command-line interface. It allows the user to display TCP/IP and other packets being transmitted or received over a network to which the computer is attached.

 


Frequently Asked Questions

1Who can take your course?

Students with a basic understanding of networking protocols. OSI model of networking , TCP/IP model of networking.

2What is included in your course?

  • Overview of the Wireshark tool
  • Overview of other network packet capturing tools such as TCPDump/Tshark/Dumpcap
  • Step by step follow through tutorial to capture the logs using Wireshark
  • Read wireshark logs
  • Save Wireshark logs

3What will the student gain from your course?

  • Hands-on experience in working with WireShark
  • Protocol analysis
  • Identifying the interworking of protocols

4What software skills are you teaching and how well are these tools used in the industry?

WireShark is used to capture/read traffic between interfaces and is a crucial tool in system integration, testing and troubleshooting in the Networking/mobile and testing domain.

5What is the real world application for the tools and techniques will you teach in this course?

  • Troubleshooting scenarios
  • System Integration
  • Protocol testing

6Which companies use these techniques and for what?

  • Extreme, Cisco, Ericsson, Nokia, Juniper, almost all networking, mobile companies and  Software services providers etc.

7How is your course going to help me in my path to MS or PhD?

  • It helps in better understanding of traffic flow, protocols and its working. WireShark is an excellent tool for students of networking.

8How is this course going to help me get a job?

  • Real world examples can help you understand how you can use Wireshark to test for situations where you are stuck because of some or the other networking issue.


SKILL LYNC WORKS TO GET YOU A JOB

See all

Certification

  • Top 5% of the class will get a merit certificate
  • Course completion certificates will be provided to all students
  • Build a professional portfolio
  • Automatically link your technical projects
  • E-verified profile that can be shared on LinkedIn

Flexible Course Fees

Choose the plan that’s right for you

Basic

2 Months Access

7000

Per month for 3 months

  • Access Duration : 2 months
  • Mode of Delivery : Online
  • Project Portfolio : Available
  • Certification : Available
  • Email Support : Available
  • Forum Support : Available
Premium

Lifetime Access

15000

Per month for 3 months

  • Access Duration : Lifetime
  • Mode of Delivery : Online
  • Project Portfolio : Available
  • Certification : Available
  • Individual Video Support : 12/ Month
  • Group Video Support : 12/ Month
  • Email Support : Available
  • Forum Support : Available
  • Telephone Support : Available
  • Dedicated Support Engineer : Available

Testimonials

Companies hire from us

See all

You Might Also Be Interested In

Related Courses

See all

The Skill-Lync Advantage

See all