Lynda - Wireshark Malware and Forensics
"softddl.org"
21-02-2021, 20:11
-
Share on social networks:
-
Download for free: Lynda -
-
Duration: 2h 7m | MP4 | Video: AVC, 1280x720 30 fps | Audio: AAC, 48 KHz, 2 Ch | Size: 301 MB
Skill Level: Intermediate | Genre: eLearning | Language: English + Subtitles
Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.
Duration: 2h 7m | MP4 | Video: AVC, 1280x720 30 fps | Audio: AAC, 48 KHz, 2 Ch | Size: 301 MB
Skill Level: Intermediate | Genre: eLearning | Language: English + Subtitles
Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.
Topics include:
Trends in cyberattacks
Preventing system compromise
Analyzing packets
Using Wireshark
Creating firewall rules
Baselining a network
Using capture filters
Using a ring buffer
Handling OSI layer attacks
Identifying attack signatures
Using VirusTotal
Handling unwanted TOR activity
Homepage
https://www.lynda.com/Wireshark-tutorials/Wireshark-Malware-Forensics/624305-2.html
Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me
Links are Interchangeable - No Password - Single Extraction
The minimum comment length is 50 characters. comments are moderated