TAW – Troubleshooting TCP/IP Networks with WireShark – Knowledge Club

TAW – Troubleshooting TCP/IP Networks with WireShark

Teacher

Mandy Jackson

Category

CISCO Network Analyse&Monitoring WireShark

Course Attendees

Still no participant

Course Reviews

Still no reviews

The Course Name: TAW - Troubleshooting TCP/IP Networks with WireShark

 

The Duration: 5 Days

 

The Overview:

 

The purpose of this course is to teach participants how to use Wireshark to troubleshoot TCP/IP networks

 

What You Will Learn:

  •         Main reasons for network performance complaints
  •         How to place the analyzer properly for traffic capture on a variety of network types
  •         How to capture packets on wired and wireless networks
  •         How to configure Wireshark for best performance and non-intrusive analysis
  •         How to navigate through, split, and work with large traffic files
  •         How to use time values to identify network performance problems
  •         How to create statistical charts and graphs to pinpoint performance issues
  •         How to filter out traffic for more efficient troubleshooting and analysis
  •         How to customize Wireshark coloring to focus on network problems faster
  •         How to use Wireshark's Expert System to understand various traffic problems
  •         How to use the TCP/IP Resolution Flowchart to identify possible communication faults
  •         How to analyze normal/abnormal Domain Name System (DNS) traffic
  •         How to analyze normal/abnormal Address Resolution Protocol (ARP) traffic
  •         How to analyze normal/abnormal Internet Protocol v4 (IPv4) traffic
  •         How to analyze normal/abnormal Internet Control Messaging Protocol (ICMP) traffic
  •         How to analyze normal/abnormal User Datagram Protocol (UDP) traffic
  •         How to analyze normal/abnormal Transmission Control Protocol (TCP) traffic
  •         How to analyze normal/abnormal Hypertext Transport Protocol (HTTP/HTTPS) traffic

 

The Course Index:

 

1 Place the analyzer properly for traffic capture on a variety of network types

1.1. Processing Packets

1.2. Live capture from many different network media

2 Capture packets on wired and wireless networks

2.1. Capturing Traffic

2.2. Analyzer Placement

2.3. Capture Interfaces

2.4. Capture using a network tap

2.5. WLAN (IEEE 802.11) capture

3 Configure Wireshark for best performance and non-intrusive analysis

3.1. Planning the capture operation

3.2. Verify the installation

3.3. Configure Wireshark

3.4. To Set Up a Capture

4 Navigate through large communication files and alter packet appearance

4.1. File Management

4.2. File Sets

5 Save, export, and print network analysis details

5.1. Save packets

5.2. Exporting data

5.3. Printing packets

6 Use time values to identify network performance problems

6.1. How Wireshark Measures Packet Time

6.2. Choose the Ideal Time Display Format

6.3. Send Trace Files Across Time Zones

6.4. Identify Client, Server and Path Delays

6.5. Packet time referencing

7 Filter out traffic for more efficient troubleshooting and analysis

7.1. Filtering packets

7.2. Building display filter expressions

7.3. Manage filters

7.4. Finding packets

7.5. Export HTTP Objects

7.6. Display HTTP Statistics

7.7. Graph HTTP Traffic Flows

8 Create statistical charts and graphs based on network traffic

8.1. Statistics

8.2. The Protocol Hierarchy

8.3. Conversations

8.4. Endpoints

8.5. The IO Graphs

9 Use Wireshark’s Expert System to pinpoint network problems

9.1. Expert Information

9.2. Errors

9.3. Warnings and Notes

9.4. Chats and Packet comments

9.5. Expert Severities Filtered

9.6. Meta Analysis and Tracing Engine (MATE)

9.7. MATE Analysis

9.8. PDU data extraction

9.9. MATE’s PDU tree

9.10. Grouping Pdus together (Gop)

9.11. Grouping Gops together (Gog)

9.12. Configure Gop for requests

9.13. Separating requests from multiple users

9.14. MATE configuration examples

10 Use the TCP/IP Resolution Flowchart to identify possible communication faults

10.1.  TCP/IP Analysis Overview

10.2.  Follow the Multi-Step Resolution Process

10.3.  Build the Packet

11 Analyze normal/abnormal Domain Name System (DNS) traffic

11.1.  DNS Message Format

11.2.  DNS Header Section

11.3.  DNS Question and Resource Record Format

11.4.  Dissecting DNS query/response

11.5.  Unusual DNS traffic

11.6.  Filter on DNS/MDNS Traffic

12 Analyze normal/abnormal Address Resolution Protocol (ARP) traffic

12.1.  ARP Header

12.2.  Analyze Gratuitous ARPs

12.3.  Analyze ARP Problems

12.4.  Filter on ARP Traffic

13 Analyze normal/abnormal Internet Protocol v4 (IPv4) traffic

13.1.  IPv4 Header

13.2.  IPv4 Header Structure

13.3.  Analyze IPv4 Problems

13.4.  IPv4 Protocol Preferences

13.5.  Troubleshoot Encrypted Communications

13.6.  Filter on IPv4 Traffic

14 Analyze normal/abnormal Internet Control Messaging Protocol (ICMP) traffic

14.1.  ICMP Header

14.2.  ICMP Header Structure

14.3.  Analyze Normal ICMP Traffic

14.4.  Analyze ICMP Problems

14.5.  Filter on ICMP Traffic

15 Analyze normal/abnormal Transmission Control Protocol (TCP) traffic

15.1.  TCP header

15.2.  TCP communicates

15.3.  Recovery features

15.4.  The flow control mechanism

15.5.  Analysis flags in Wireshark

15.6.  Unusual TCP traffic

15.7.  Filter on TCP Traffic

16 Analyze normal/abnormal User Datagram Protocol (UDP) traffic

16.1.  UDP Header

16.2.  UDP Packet Structure

16.3.  Normal UDP Traffic

16.4.  Unusual UDP traffic

16.5.  UDP scans

16.6.  Filter on UDP Traffic

17 Analyze normal/abnormal Dynamic Host Configuration Protocol (DHCP) traffic

17.1.  DHCP Header

17.2.  DHCP Packet Structure

17.3.  DHCP message types

17.4.  Analyze Normal DHCP Traffic

17.5.  Analyze DHCP Problems

17.6. Filter on DHCP Traffic

18 Analyze normal/abnormal Hypertext Transport Protocol (HTTP) traffic

18.1.  HTTP Request

18.2.  The HTTP Status Code Registry

18.3.  HTTP Response

18.4.  Unusual HTTP traffic

18.5.  HTTP redirection

18.6.  Filter on HTTP Traffic

19 Analyze normal/abnormal Telnet traffic

20 Analyze normal/abnormal File Transfer Protocol (FTP) traffic

20.1.  File Transfer Protocol (FTP)

20.2.  Dissecting FTP communications

20.3.  Dissecting FTP packets

20.4.  Reassembling the FTP

20.5.  Unusual FTP

20.6.  Filter on FTP Traffic

21 Analyze normal/abnormal Post Office Protocol (POP) traffic

21.1.  POP3 Packet Structure

21.2.  POP3 Communications

21.3.  Usual POP3 traffic

21.4.  Usual POP3 traffic encrypted connection

21.5.  Analyze POP Problems

21.6.  Filter on POP3 Traffic

22 Analyze normal/abnormal Simple Mail Transfer Protocol (SMTP) traffic

22.1.  SMTP Packet Structure

22.2.  SMTP Communications

22.3.  Usual SMTP traffic

22.4.  Unusual SMTP traffic

22.5.  Filter on SMTP Traffic

Our Main Teachers

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean egestas magna at porttitor vehicula.

Price : Free

Max Availability : 20

Question