Free

Sniffing

This course covers basic sniffing as part of a penetration test. Attackers and penetration testers use sniffing to analyze network packets for information.
11
47
M
Time
beginner
difficulty
14
ceu/cpe

Course Content

TCPDump

0m

Module 2: Wireshark and TCPDUMP
TCPDUMP Lab

9m

Module 2: Wireshark and TCPDUMP
Applying Filters to TCPDump and Wireshark

0m

Module 2: Wireshark and TCPDUMP
Packet Sniffing

34m

Module 2: Wireshark and TCPDUMP
PacketSniffing Lab Part 2

4m

Module 2: Wireshark and TCPDUMP
Packet Sniffing Lab Part 1

9m

Module 2: Wireshark and TCPDUMP
Wireshark

0m

Module 2: Wireshark and TCPDUMP
Wireshark Lab Part 3

5m

Module 2: Wireshark and TCPDUMP
Wireshark Lab Part 2

7m

Module 2: Wireshark and TCPDUMP
Wireshark Lab Part 1

8m

Module 2: Wireshark and TCPDUMP
Introduction

6m

Module 1: Introduction
Conclusion

3m

Module 3: Conclusion
Analyzing Protocols

0m

Module 3: Conclusion
Analyzing Captured Traffic

0m

Module 3: Conclusion
Customizing Wireshark

0m

Module 3: Conclusion
Wireshark Functionality

0m

Module 3: Conclusion
Installing Wireshark

0m

Module 3: Conclusion
Capstone Lab Navigation

2m

Module 3: Conclusion
Course Description

In this course, we focus our attention on two common tools for sniffing for penetration testing: Wireshark and TCPDump. The course is intended to be primarily hands-on, so you will need access to either the Cybrary lab environment or you will need to build out your own virtual systems for testing. We do not cover the buildout of your own virtual systems in this course. All hands-on labs for the course will have an associated step by step guide and we have also provided additional study resources with this course.

The course is focused on hands-on learning and students will need access to the Cybrary lab environment to complete the step by step labs as well as the final assessments. However, students can also choose to set up their own labs but set up and configuration of those labs will not be covered in this course.

This course is part of a Career Path:
No items found.

Instructed by

Instructor
Ken Underhill

I'm a cybersecurity professional who has worked primarily in healthcare and as an adjunct professor of digital forensics. I have been instructing online for several years, primarily in business and health-related areas. I hold both the CEH (Certified Ethical Hacker)and CHFI (Computer Hacking Forensic Investigator) certifications from EC-Council and am a content reviewer/writer for both exams (no, I can’t give you the answer key lol). I began helping other professionals pass the CHFI exam after struggling in my first exam attempt. To date, I have helped tens of thousands of people around the world pass the CEH and CHFI exams.

Provider
Cybrary Logo
Certification Body
Certificate of Completion

Complete this entire course to earn a Sniffing Certificate of Completion