Wireshark Logo is a registered trademark of Wireshark. All rights reserved.
Wireshark Certified Network Analyst
Schedule
Start | End | Duration | Location | Details |
---|
Course Details
Wireshark Certified Network Analyst
Course Code: WCNA
Duration: 5 Days
Prerequisite:
- Knowledge of Networking
Course Description:
Wireshark is the one of the most popular network analyzer tools available worldwide. To successfully achieve Wireshark Certified Network Analyst certification, a candidate needs to establish his expertise in network analysis for security and performance purposes in an enterprise environment. This course will help you do just that. You will gain insider tips and tricks so that you can quickly spot performance issues. The intensive training program will include as many as 49 case studies offering insight into various security and performance issues faced by companies and how to solve them using Wireshark.
Course Objectives:
- Identifying glitches in network performance because of high path latency.
- Locating those devices on the network that tend to drop packets.
- Validating optimal configuration of network hosts.
- Analyzing dependencies and application functionalities.
- Optimizing application behavior for best performance.
Course Outlines:
Chapter 1: The World of Network Analysis
Chapter 2: Introduction to Wireshark
Chapter 3: Capture Traffic
Chapter 4: Create and Apply Capture Filters
Chapter 5: Define Global and Personal Preferences
Chapter 6: Colorize Traffic
Chapter 7: Define Time Values and Interpret Summaries
Chapter 8: Interpret Basic Trace File Statistics
Chapter 9: Create and Apply Display Filters
Chapter 10: Follow Streams and Reassemble Data
Chapter 11: Customize Wireshark Profiles
Chapter 12: Annotate, Save, Export and Print Packets
Chapter 13: Use Wireshark’s Expert System
Chapter 14: TCP/IP Analysis Overview
Chapter 15: Analyze Domain Name System (DNS) Traffic
Chapter 16: Analyze Address Resolution Protocol (ARP) Traffic
Chapter 17: Analyze Internet Protocol (IPv4/IPv6) Traffic
Chapter 18: Analyze Internet Control Message Protocol (ICMPv4/ICMPV6) Traffic
Chapter 19: Analyze User Datagram Protocol (UDP) Traffic
Chapter 20: Analyze Transmission Control Protocol (TCP) Traffic
Chapter 21: Graph IO Rates and TCP Trends
Chapter 22: Analyze Dynamic Host Configuration Protocol (DHCPv4/DHCPv6) Traffic
Chapter 23: Analyze Hypertext Transfer Protocol (HTTP) Traffic
Chapter 24: Analyze File Transfer Protocol (FTP) Traffic
Chapter 25: Analyze Email Traffic
Chapter 26: Introduction to 802.11 (WLAN) Analysis
Chapter 27: Introduction to Voice over IP (VoIP) Analysis
Chapter 28: Baseline “Normal” Traffic Patterns
Chapter 29: Find the Top Causes of Performance Problems
Chapter 30: Network Forensics Overview
Chapter 31: Detect Scanning and Discovery Processes
Chapter 32: Analyze Suspect Traffic
Chapter 33: Effective Use of Command-Line Tools