Categories
Networking Concepts Python TCP/IP Model

Mastering Wireshark 3

Mastering Wireshark 3: Take network analysis and network forensics with Wireshark a step further and detect threat intrusion , Second Edition

About the Author

Rick Bodnar is an IT professional with an extensive technology background, and he has worked with technology for over 24 years.   In that time, he has held a variety of IT management positions.  In addition, he has also been an adjunct instructor for higher education institutions like Kent State University, Penn State University, and the University of Mount Union. 

His focus is on networking technology.  Some of the technologies that Rick Bodnar is proficient in include TCP/IP networking, IP routing, VPN Tunneling, DNS, and various other networking technologies.  He has worked with Wireshark for over 15 years.

Summary of Topics

  • Customization of Wireshark
  • Using Wireshark for capturing and examining traffic
  • Examining and Analyzing Traffic Analysis
  • Analyzing Network Protocols
  • Analyzing Application Protocols
  • Wireshark Commands
  • Troubleshooting Scenarios
  • Expanding Wireshark Functionality

Leave a Reply

Your email address will not be published. Required fields are marked *