Lynda - Wireshark Malware and Forensics

"softddl.org"
21-02-2021, 20:11
Rating:
0
0 vote

  • Lynda - Wireshark Malware and Forensics
    Duration: 2h 7m | MP4 | Video: AVC, 1280x720 30 fps | Audio: AAC, 48 KHz, 2 Ch | Size: 301 MB
    Skill Level: Intermediate | Genre: eLearning | Language: English + Subtitles
    Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.


Lynda - Wireshark Malware and Forensics
Duration: 2h 7m | MP4 | Video: AVC, 1280x720 30 fps | Audio: AAC, 48 KHz, 2 Ch | Size: 301 MB
Skill Level: Intermediate | Genre: eLearning | Language: English + Subtitles
Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.


Topics include:
Trends in cyberattacks
Preventing system compromise
Analyzing packets
Using Wireshark
Creating firewall rules
Baselining a network
Using capture filters
Using a ring buffer
Handling OSI layer attacks
Identifying attack signatures
Using VirusTotal
Handling unwanted TOR activity
Homepage
https://www.lynda.com/Wireshark-tutorials/Wireshark-Malware-Forensics/624305-2.html


Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me


Links are Interchangeable - No Password - Single Extraction
 
Comments
The minimum comment length is 50 characters. comments are moderated
There are no comments yet. You can be the first!
Download free » Tutorials » Lynda - Wireshark Malware and Forensics
Copyright holders