• 100 Queen St W, Brampton, ON L6X 1A4, Canada
  • +1-800-961-0337
For more details, please call us on +1800-961-0337 or email us on info@microteklearning.com


In this course you will get top to bottom preparing on Wireshark® and TCP/IP correspondences examination. You will figure out how to utilize Wireshark to recognize the most well-known reasons for execution issues in TCP/IP interchanges. Themes you will cover in this course include: 

  • Movement catching systems and analyzer situation 
  • Movement sifting (catch/show) 
  • Redone profiles creation 
  • Shading rules, diagramming, field understandings, and usefulness of key TCP/IP correspondences 
  • Typical conduct of ARP, DNS, IP, TCP, UDP, ICMP, and HTTP/HTTPS 
  • Dormancy issue distinguishing proof 
  • Association foundation concerns 
  • Administration refusals 
  • Regular signs of surveillance forms and broke hosts 

Investigating TCP/IP NETWORKS WITH WIRESHARK Course Objectives 

  •  Top 10 purposes behind system execution grievances 
  •  Place the analyzer legitimately for movement catch on an assortment of  system sorts 
  •  Capture parcels on wired and remote systems 
  •  Configure Wireshark for best execution and non-meddlesome  investigation 
  •  Navigate through, split, and work with substantial movement records 
  •  Use time esteems to distinguish organize execution issues 
  •  Create measurable diagrams and charts to pinpoint execution issues 
  •  Filter out activity for more proficient investigating and examination 
  •  Customize Wireshark shading to concentrate on organize issues quicker 
  •  Use Wireshark's Expert System to comprehend different activity issues 
  •  Use the TCP/IP Resolution Flowchart to recognize conceivable  correspondence issues 
  •  Analyze typical/unusual Domain Name System (DNS) activity 
  •  Analyze typical/unusual Address Resolution Protocol (ARP) activity 
  •  Analyze typical/unusual Internet Protocol v4 (IPv4) activity 
  •  Analyze typical/unusual Internet Control Messaging Protocol (ICMP) activity 
  •  Analyze typical/unusual User Datagram Protocol (UDP) activity 
  •  Analyze typical/unusual Transmission Control Protocol (TCP) activity 
  •  Analyze typical/unusual Hypertext Transport Protocol (HTTP/HTTPS)  activity


1. Prologue to Network Analysis and Wireshark 

  • TCP/IP Analysis Checklist 
  • Top Causes of Performance Problems 
  • Get the Latest Version of Wireshark 
  • Catching Traffic 
  • Opening Trace Files 
  • Handling Packets 
  • The Qt Interface Overview 
  • Utilizing Linked Panes 
  • The Icon Toolbar 
  • Ace the Intelligent Scrollbar 
  • The Changing Status Bar 
  • Right-Click Functionality 
  • General Analyst Resources 
  • Your First Task When You Leave Class 

2. Learn Capture Methods and Use Capture Filters 

  • Dissect Switched Networks 
  • Stroll Through a Sample SPAN Configuration 
  • Dissect Full-Duplex Links with a Network TAP 
  • Dissect Wireless Networks 
  • USB Capture 
  • Beginning Analyzing Placement 
  • Remote Capture Techniques 
  • Accessible Capture Interfaces 
  • Spare Directly to Disk 
  • Catch File Configurations 
  • Point of confinement Your Capture with Capture Filters 
  • Look at Key Capture Filters 

3. Modify for Efficiency: Configure Your Global Preferences 

  • Initial Step: Create a Troubleshooting Profile 
  • Modify the User Interface 
  • Include Custom Columns for the Packet List Pane 
  • Set Your Global Capture Preferences 
  • Characterize Name Resolution Preferences 
  • Arrange Individual Protocol Preferences 

4. Explore Quickly and Focus Faster with Coloring Techniques 

  • Move Around Quickly: Navigation Techniques 
  • Discover a Packet Based on Various Characteristics 
  • Manufacture Permanent Coloring Rules 
  • Recognize a Coloring Source 
  • Utilize the Intelligent Scrollbar with Custom Coloring Rules 
  • Apply Temporary Coloring 
  • Stamp Packets of Interest 

5. Spot Network and Application Issues with Time Values and Summaries 

  • Look at the Delta Time (End-of-Packet to End-of-Packet) 
  • Set a Time Reference 
  • Look at Timestamp Values 
  • Look at Timestamps of Filtered Traffic 
  • Empower and Use TCP Conversation Timestamps 
  • Think about TCP Conversation Timestamp Values 
  • Decide the Initial Round Trip Time (iRTT) 
  • Investigating Example Using Time 
  • Examine Delay Types 

6. Make and Interpret Basic Trace File Statistics 

  • Inspect Trace File Summary Information 
  • View Active Protocols 
  • Diagram Throughput to Spot Performance Problems Quickly 
  • Find the Most Active Conversations and Endpoints 
  • Other Conversation Options 
  • Diagram the Traffic Flows for a More Complete View 
  • Burst Statistics 
  • Various Other Statistics are Available 
  • Brisk Overview of VoIP Traffic Analysis 
  • Taste and RTP Analysis Overview 
  • Taste Call Setup 
  • Examining Call Setup with SIP 
  • Session Bandwidth and RTP Port Definition 

7. Concentrate on Traffic Using Display Filters 

  • Show Filters 
  • Channel on Conversations/Endpoints 
  • Fabricate Filters Based on Packets 
  • Show Filter Syntax 
  • Utilize Comparison Operators and Advanced Filters 
  • Channel on Text Strings 
  • Construct Filters Based on Expressions 
  • Look for Common Display Filter Mistakes 
  • Offer Your Display Filters 

8. TCP/IP Communications and Resolutions Overview 

  • TCP/IP Functionality 
  • When Everything Goes Right 
  • The Multi-Step Resolution Process 
  • Determination Helped Build the Packet 
  • Where Faults Can Occur 
  • Average Causes of Slow Performance 

9. Break down DNS Traffic 

  • DNS Overview 
  • DNS Packet Structure 
  • DNS Queries 
  • Channel on DNS Traffic 
  • Break down Normal/Problem DNS Traffic 

10. Break down ARP Traffic 

  • ARP Overview 
  • ARP Packet Structure 
  • Channel on ARP Traffic 
  • Investigate Normal/Problem ARP Traffic 

11. Investigate IPv4 Traffic 

  • IPv4 Overview 
  • IPv4 Packet Structure 
  • Investigate Broadcast/Multicast Traffic 
  • Channel on IPv4 Traffic 
  • IP Protocol Preferences 
  • Investigate Normal/Problem IP Traffic 

12. Investigate ICMP Traffic 

  • ICMP Overview 
  • ICMP Packet Structure 
  • Channel on ICMP Traffic 
  • Investigate Normal/Problem ICMP Traffic 

13. Investigate UDP Traffic 

  • UDP Overview 
  • Look for Service Refusals 
  • UDP Packet Structure 
  • Channel on UDP Traffic 
  • Take after UDP Streams to Reassemble Data 
  • Investigate Normal/Problem UDP Traffic 

14. Investigate TCP Protocol 

  • TCP Overview 
  • The TCP Connection Process 
  • TCP Handshake Problem 
  • Watch Service Refusals 
  • TCP Packet Structure 
  • The TCP Sequencing/Acknowledgment Process 
  • Parcel Loss Detection in Wireshark 
  • Quick Recovery/Fast Retransmission Detection in Wireshark 
  • Retransmission Detection in Wireshark 
  • Out-of-Order Segment Detection in Wireshark 
  • Particular Acknowledgment (SACK) 
  • Window Scaling 
  • Window Size Issue: Receive Buffer Problem 
  • Window Size Issue: Unequal Window Size Beliefs 
  • TCP Sliding Window Overview 
  • Investigate TCP Quickly with Expert Info 
  • Channel on TCP Traffic and TCP Problems 
  • Legitimately Set TCP Preferences 
  • Take after TCP Streams to Reassemble Data 16. Analyze Advanced Trace File Statistics 
  • Assemble Advanced IO Graphs 
  • Diagram Round Trip Times 
  • Diagram TCP Throughput 
  • Discover Problems Using TCP Time-Sequence Graphs 

15. Diagram Traffic Characteristics 

  • Propelled I/O Graphing 
  • Chart Round Trip Times 
  • Chart TCP Throughput 
  • Discover Problems Using TCP Time Sequence Graphs 

16. Break down HTTP Traffic 

  • HTTP Overview 
  • HTTP Packet Structure 
  • Channel on HTTP Traffic 
  • Reassembling HTTP Objects 
  • HTTP Statistics 
  • HTTP Response Time 
  • Outline of HTTP/2 
  • HTTP/2 Analysis Fundamentals 
  • HTTP/2 Frame Format 
  • Break down Normal/Problem HTTP Traffic 

17. Break down TLS-Encrypted Traffic (HTTPS) 

  • Break down HTTPS Traffic 
  • Scrambled Alerts 
  • Unscrambling Steps 
  • Channel on SSL 

18. Survey Your 10 Key Troubleshooting Steps 

  • Standard "NormalTraffic 
  • Utilize Color 
  • Look Who's Talking: Examine Conversations and Endpoints 
  • Center by Filtering 
  • Make Basic IO Graphs 
  • Look at Delta Time Values 
  • Look at the Expert System 
  • Take after the Streams 
  • Chart Bandwidth Use, Round Trip Time, and TCP Time/Sequence Information 
  • Watch Refusals and Redirections