Course Outline

  • Command-Line Tools and How to Use Them for Government
  • TShark and Dumpcap Command-Line Tools
  • Capinfos Command-Line Tool
  • Editcap Command-Line Tool
  • Mergecap Command-Line Tool
  • Text2pcap Command-Line Tool
  • Splitting and Merging Trace Files
  • Advanced Usage of Capture and Display Filters
  • Writing Advanced Capture Filter Scripts
  • Writing Advanced Display Filters
  • Using Triggered Filters
  • Advanced Expert System Usage
  • Dealing with Congestion: Shattered Windows and Flooding
  • Establishing Baseline Network Communications
  • Identifying Unusual Network Communications
  • Vulnerabilities in the TCP/IP Resolution Process
  • Lab Exercises and Case Studies
  • Identifying Active Devices on the Network
  • Port Scans
  • Mutant Scans
  • IP Scans
  • Application Mapping
  • OS Fingerprinting
  • Lab Exercises and Case Studies
  • VoIP Analysis for Government
  • SIP Analysis and Troubleshooting
  • RTP, RTCP, and Media Analysis
  • Creating VoIP Filters and Analysis Profiles
  • Lab Exercises and Case Studies
  • Application Analysis and Troubleshooting for Government
  • HTTP Analysis and Troubleshooting
  • FTP Analysis and Troubleshooting
  • DNS Operation and Troubleshooting
  • Video Transmission Analysis
  • Addressing Network-Related Database Issues
  • Network Security and Forensics Basics for Government
  • Gathering Information: What to Look For
  • Identifying Unusual Traffic Patterns
  • Using Complementary Tools
  • Detecting Suspicious Security Patterns
  • MAC and IP Address Spoofing
  • Attack Signatures and Signature Locations
  • ARP Poisoning
  • Header and Sequencing Signatures
  • Attacks and Exploits
  • TCP Splicing and Unusual Traffic Patterns
  • DoS and DDoS Attacks
  • Protocol Scans
  • Maliciously Malformed Packets
  • Lab Exercises and Case Studies

Requirements

In-depth knowledge of the TCP/IP protocol stack is required, along with participation in the “Basic Network Troubleshooting using Wireshark” course or equivalent experience. Participants should bring their laptops with Wireshark software installed (available for free download from www.wireshark.org). This ensures alignment with the technical requirements for government network diagnostics and maintenance.

 21 Hours

Number of participants


Price per participant

Testimonials (5)

Upcoming Courses

Related Categories