{"id":107,"date":"2021-12-05T18:04:00","date_gmt":"2021-12-05T18:04:00","guid":{"rendered":"http:\/\/www.rickbodnar.com\/?p=107"},"modified":"2024-12-05T20:10:01","modified_gmt":"2024-12-05T20:10:01","slug":"mastering-wireshark-3","status":"publish","type":"post","link":"https:\/\/rickbodnar.com\/?p=107","title":{"rendered":"Mastering Wireshark 3"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/www.packtpub.com\/en-us\/product\/mastering-wireshark-3-9781839213953\">Mastering Wireshark 3: Take network analysis and network forensics with Wireshark a step further and detect threat intrusion , Second Edition<\/a><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>About the Author <\/strong>&#8211;<\/h3>\n\n\n\n<p>Rick Bodnar is an IT professional with an extensive technology background, and he has worked with technology for over 24 years.&nbsp;&nbsp; In that time, he has held a variety of IT management positions.&nbsp; In addition, he has also been an adjunct instructor for higher education institutions like Kent State University, Penn State University, and the University of Mount Union.&nbsp;<\/p>\n\n\n\n<p>His focus is on networking technology.&nbsp; Some of the technologies that Rick Bodnar is proficient in include TCP\/IP networking, IP routing, VPN Tunneling, DNS, and various other networking technologies.&nbsp; He has worked with Wireshark for over 15 years.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Summary of Topics<\/h3>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li>Customization of Wireshark<\/li>\n\n\n\n<li>Using Wireshark for capturing and examining traffic<\/li>\n\n\n\n<li>Examining and Analyzing Traffic Analysis<\/li>\n\n\n\n<li>Analyzing Network Protocols<\/li>\n\n\n\n<li>Analyzing Application Protocols<\/li>\n\n\n\n<li>Wireshark Commands<\/li>\n\n\n\n<li>Troubleshooting Scenarios<\/li>\n\n\n\n<li>Expanding Wireshark Functionality<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<p class=\"has-text-align-left\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mastering Wireshark 3: Take network analysis and network forensics with Wireshark a step further and detect threat intrusion , Second Edition About the Author &#8211; Rick Bodnar is an IT professional with an extensive technology background, and he has worked with technology for over 24 years.&nbsp;&nbsp; In that time, he has held a variety of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[2,13,7],"tags":[],"class_list":["post-107","post","type-post","status-publish","format-standard","hentry","category-networking-concepts","category-python","category-tcpip-model"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p91cKS-1J","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/rickbodnar.com\/index.php?rest_route=\/wp\/v2\/posts\/107","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rickbodnar.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rickbodnar.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rickbodnar.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rickbodnar.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=107"}],"version-history":[{"count":5,"href":"https:\/\/rickbodnar.com\/index.php?rest_route=\/wp\/v2\/posts\/107\/revisions"}],"predecessor-version":[{"id":164,"href":"https:\/\/rickbodnar.com\/index.php?rest_route=\/wp\/v2\/posts\/107\/revisions\/164"}],"wp:attachment":[{"href":"https:\/\/rickbodnar.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=107"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rickbodnar.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=107"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rickbodnar.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=107"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}