Best Wireshark Courses

Find the best online Wireshark Courses for you. The courses are sorted based on popularity and user ratings. We do not allow paid placements in any of our rankings. We also have a separate page listing only the Free Wireshark Courses.

Wireshark: Packet Analysis and Ethical Hacking: Core Skills

From basic to advanced network analysis using Wireshark! Ethical Hacking using Kali Linux: Passwords, Security, Protocol

Created by David Bombal - CCIE #11023, over 15 years of network training experience


Students: 165435, Price: $19.99

Students: 165435, Price:  Paid

Learn Wireshark practically. Wireshark pcapng files provided so you can practice while you learn! There is so much to learn in this course:

- Capture Telnet, FTP, TFTP, HTTP passwords.

- Replay VoIP conversations.

- Capture routing protocol (OSPF) authentication passwords.

- Troubleshoot network issues.

- Free software.

- Free downloadable pcapng files.

- Answer quiz questions.

The course is very practical. You can practice while you learn!

Learn how to analyze and interpret network protocols and leverage Wireshark for what it was originally intended: Deep Packet Inspection and network analysis.

I also show you have to hack network protocols using Kali Linux! Hack network protocols like DTP, VTP, STP and DHCP using Ethical hacking tools included in Kali Linux.

Updates: Now includes Python scripting to automatically capture packets from the network using tshark. Lean how to automate your captures and learn how to hack the network using Python and Wireshark.

Protocols we capture and discuss in this course include:

- Telnet




- VoIP






-  VTP



Hacking Academy: How to Monitor & Intercept Transmitted Data

Learn how to intercept data in your network. Monitor transmitted data and detect intrusion. Free hacking lesson.

Created by IT Security Academy - IT Security Certified Professional


Students: 138055, Price: Free

Students: 138055, Price:  Free


Hacking Academy: Monitoring Transmitted Data

We are introducing one of the most interesting modules from our Hacking in Practice: Certified Ethical Hacking MEGA Course available on Udemy.

During 1.5 hours of training you will learn how to intercept data in your network. You'll get to know one of the most powerful and versatile ethical hacking tools - Wireshark. You'll be shocked how much there is to read and monitor...

Before you begin: the practical use of the course you are going to see has been proven by  thousands of people all over the world. People who make their first  steps in computer / network security and professionals: network  administrators, programmers, pentesters, black- and white hat hackers.  Please, read carefully what we’d like to share with you.

IT Security Academy (ISA) is a company that associates ITsec Professionals. Now we are proud to share our knowledge online. Certified  experts (CISS, MCSE:MS, CEH, CISSP) have created courses from Beginner  to Advanced level. Our goal is to provide the highest quality materials  you’ve ever seen online and prepare you not only for certification  exams, but also teach you pratical skills. You’re welcome to join us and  start your training anytime.

Want more?

If you're serious about learning ethical hacking and IT sec in general, here's what's waiting for you inside our Complete Certified Ethical Hacking Course - ISA CISS:

+ 16 main course sections (from hacking history, designing secure networks to disaster recovery and application security)
+ 240 independent training modules for your convenience
+ 714 pages of PDF notes that will help you prepare to the ISA CISS examination
+ 27 hours of videos and other educational content
+ 1 examination voucher you will get after having completed the course
+ over 17.000 students already enrolled
+ over 130 five star ratings

The Complete Cyber Security Course : Network Security!

Volume 2 : Network Security, WiFi Security, WiFi Hackers, Firewalls, Wireshark, Secure Networking. + Password Managers

Created by Nathan House - Leading Cyber Security Expert


Students: 131586, Price: $119.99

Students: 131586, Price:  Paid

Become a cyber security specialist.

After this course, you will be able to
discover security vulnerabilities across an entire network, by using network hacking techniques and vulnerability

You will be able to architect your network for maximum security and
prevent local and remote attacks. We also cover the use of custom router
firmware to provide you with better network security services.

You will understand
the various types of firewalls that are available and what threats each help

Including layer 4 firewalls like Iptables on Linux and PF on MacOS and BSD. Virtual
firewalls, host-based firewalls and application based firewalls like Pfsence.
We cover firewalls on all platforms including Windows, Mac OS X and Linux for
all types of use scenarios.

We explore in detail wireless security, the configurations
that are required for maximum security and why. How Wi-Fi is hacked and how to
mitigate those attacks. Covering everything from encryption weaknesses to evil
twins, RF isolation, and Wi-Fi crackers.

You will master network monitoring to discover and identify potential hackers,
malware and other adversaries that might be lurking on your network. Using
tools like Wireshark, Tcpdump and Syslog.

We then move away from network security and
onto the details of how we are tracked
by corporations, nation-states your ISP and others. You will
understand the techniques used like zombie super cookies, browser
fingerprinting and how browser profiling works so third parties can establish
who you are online.

We look at search engine privacy - and how to mitigate the
tracking and privacy issues of search engines and their associated services.

- We cover one of the largest risks
online, the browser. The doorway into your system. How to best reduce the
attack surface of the browser and harden it for maximum security and privacy. A critical consideration for reducing your risk.

Finally you will fully understand how to
best use methods of authentication
including passwords and multi-factor authentication - soft tokens and hard

The best password managers to use and why. How passwords are
cracked, and how to mitigate the cracking.

This is volume 2 of 4 of your complete guide to cyber security privacy and anonymity.  

So You Want to be a Network Engineer?

Find out which IT certification is right for you with these sample lessons. From beginner to advanced.

Created by Paul Browning - Cisco Engineer and Internet Entrepreneur


Students: 99659, Price: Free

Students: 99659, Price:  Free

If you are looking to make a career change into IT or get ahead in your current IT role you need to get certified. But which career path is for you? Network support, desktop support, core router and switch support, voice networking, security engineer...the choice is overwhelming.

This series of taster lessons will let you dip your toes into a large number of courses to see which one you like the best. The courses take you from beginner level (A+ to up advanced with Cisco CCNP).

The Complete Wireshark Course: Go from Beginner to Advanced!

Learn to use Wireshark as a networking professional including troubleshooting, analysis, and protocol development!

Created by Ermin Kreponic - IT Expert


Students: 90297, Price: $124.99

Students: 90297, Price:  Paid

Wireshark is much easier to learn when you take this course and try everything you see for yourself! Wireshark is a free open-source packet analyzer that is the number one tool for network analysis, troubleshooting, software and communications protocol development, and related education in networking. Knowing Wireshark gives you the ability to successfully apply for network administrator jobs and easily earn money as a freelancer online because Wireshark is an in demand skill!

Use this course to speed up your learning with Wireshark with hands on tutorials showing you exactly what you can do in Wireshark founded on explanations of basic network terminology, installing Wireshark, and a review of the basic functions. The course begins with the basics and continues to dive deeper allowing you to follow along and try everything you see for yourself!

You should act on your feelings of love, hope, and faith to take this course now if you want to learn a valuable skill to use in your own company or to make money as a freelancer or employee working in a network administration job!

Cisco CCNA Network Fundamentals Final Chapters

This is a course to get started with Network Fundamentals. Come and learn, start from the very beginning

Created by Kiel Martin - CCIE #54443


Students: 43354, Price: Free

Students: 43354, Price:  Free

This is the last 2 course of the series Networking Fundamentals. Here we immediately go into the basics of Network types and LAN devices. Next we cover communication over the LAN.

You will learn about the basics of what a LAN is, what devices we will be using, and the ability to see LAN Networking in a different manner. We learn about CSMA/CD, Half & full Duplex, Collison & Broadcast Domains,how Mac address tables are created, and so on . You will learn where a router and a switch fits in the Network. You will also learn about what pins are used to transmit and receive.

It is a lot of fun, let's get started.

Introduction to SDN and OpenFlow

What is SDN, OpenFlow and NFV? Is this actually real? Do you want to see real world, practical examples of SDN?

Created by David Bombal - CCIE #11023, over 15 years of network training experience


Students: 41160, Price: Free

Students: 41160, Price:  Free

This is an introductory SDN and OpenFlow course explaining different visions of what SDN actually is. The course also shows you real world implementations of SDN in very large networks as well as highly secure networks.

You will also learn about how OpenFlow separates the control and data planes of networking devices.

You will then see a practical demonstration of an application communicating with an SDN controller and Open vSwitch devices.

See the full SDN architecture as part of the demonstrations:

- SDN Applications

- SDN Controller

- OpenFlow switches

See how hosts can be blocked using OpenFlow rules.

CCNA VLOGs: Pass your CCNA 200-125, ICND1 or ICND2 exam!

Regular new content to help you pass your CCENT or CCNA exam.

Created by David Bombal - CCIE #11023, over 15 years of network training experience


Students: 39342, Price: Free

Students: 39342, Price:  Free

Welcome to the CCNA VLOG! 

This course helps you prepare for the newest CCNA 200-125 exam, and the CCENT 100-105 exam (ICND1); and the ICND2 200-105 exam. 

This course is unlike other CCNA courses as it contains:

* Constantly updated and new material to help you prepare.

* Large amount of practical video content with detailed explanations of CCNA topics and GNS3 demonstrations

* GNS3 labs - multiple topologies using GNS3. Create your own local lab and follow along.

* Many demonstrations showing you practically how to configure and build GNS3 and Cisco networks

Networks are all around us and you are using one right now to access this course.

Imagine for a moment, how different your life would be without access to Facebook, Snapchat, Google, YouTube, Whatsapp or any of the other websites on the Internet? How would you live with no Internet?

The Internet is extremely important in modern life today and all websites and Internet communication relies on networking. This reliance is only predicted to continue with the growth of the Internet of Things (IoT) in the next few years.

Without routers, switches, network cabling and protocols like BGP there would be no Internet!

This course will teach you how networks actually work and how you are able to connect to websites like Facebook, Google, and YouTube.

Companies throughout the world (from the smallest to the largest) rely on networks designed, installed and maintained by networking engineers. Join this in demand industry!

Start your journey today learning about networking.

Content in this course can be used towards your CCNA. Topics such as IP addressing, subnetting and many others can be applied directly to passing your CCNA certification.

Access our online simulations so you can practice on simulated Cisco routers and switches. You will get to type commands such as enable, configure terminal, router ospf and many others and learn how to configure devices.

I want to welcome you to this GNS3 Cisco CCNA course! I'm David Bombal, and I have been teaching networking courses for over 15 years. I qualified as a Cisco Certified Interwork Engineer (CCIE) in 2003 and hold with numerous other networking certifications. I'm also a Cisco and HPE certified instructor where I have trained thousands of networking engineers in many of the largest companies in the world including Fortune 100 companies.

I have designed this course for anyone wanting to learn more about networking and gain foundational knowledge, to help them embark on their networking career. The concepts taught in this course can be applied directly to multiple industry certifications including the Cisco Certified Network Associate (CCNA).

In this course, you will learn about topics such as IP addressing, IP subnetting, Routing, Switches, VLANs, Spanning Tree, Network Address Translation, Wireless and a whole lot more.

You will also learn more about the latest networking trends including OpenFlow and Software Defined Networking.

The course covers the topics in the Cisco ICND1, ICND2 and CCNA exams.

At the end of this course, you will be able to confidently discuss networking topics; and be able to start configuring real networking devices such as routers and switches. In this an introductory course, but contains a lot of information that can be directly applied to the CCNA certification.

The ideal student for this course is someone looking to break into the networking field, someone looking to extend their knowledge from PCs and servers to networking, or someone interested in getting knowledge to work in one of the most exciting, most in-demand jobs in IT - networking.

There are no requirements necessary to enroll in this course, I only ask that you come open minded and ready to learn.

Feel free to take a look at the course description and some of the sample free videos.

I look forward to seeing you on the inside!

CCNA MPLS Core technologies and MPLS Layer 3 VPNs: Exam prep

Prepare for CCNA, ICND2, CCNP or CCIE exams by learning about MPLS, VRFs, MBGP, Labels, redistribution, VPNV4, PHP +more

Created by David Bombal - CCIE #11023, over 15 years of network training experience


Students: 28249, Price: Free

Students: 28249, Price:  Free

MPLS is one of the topics in the CCNA exam! You need to have a fundamental understanding of MPLS to prepare for your exam. This course explains what MPLS is, how it works and then shows you practically how to configure core MPLS and MPLS L3VPNs.

This course goes deeper to CCNP level to ensure that you are comfortable with both the CCNA exam topics as well as have knowledge for CCNP exams.

This course is practical and shows you how to configure multiple routers (P, PE, CE) using GNS3.

Learn MPLS terms such as C, P, PE, Label, PHP, VRF, MBGP, label pop, label impose, label swap and more

Learn how to configure core MPLS routers (P and PE)

Learn what labels look like with Wireshark

Learn how to redistribute between MBGP and OSPF

Learn how to configure VRFs

Learn how to configure multiple instances of OSPF

Learn about label stacking and how labels are displayed in the CEF table

This course uses GNS3 to demonstrate multiple P routers, multiple PE routers and multiple CE routers. You can now build an entire MPLS network on your laptop using GNS3!

ESP8266 IoT Web server Optimization Using Arduino IDE

Learn to use GZIP compression and improve ESP8266 IoT web server performance.

Created by Farrukh Hussain - Senior Firmware Engineer at Xekera Systems Inc.


Students: 22589, Price: Free

Students: 22589, Price:  Free

By using GZIP compression, we can reduce bandwidth usage, can increase server speed, and efficiently utilize smaller memories that are issues of prime importance when we are dealing with some embedded platform like ESP8266.

In this course, you will learn all about ESP8266 web server optimization for better performance and optimum utilization of available resources like program and data memories.

I've added some basics like how to add HTML, CSS, JS and graphic contents in ES8266 Arduino sketch, you will find it as simple as ABC even if you are at beginner level. 

If you have already developed some embedded webserver, you will be able to improve its performance by utilizing techniques learned in this course.

Here are key points you will learn

  • How to add web contents like html/css/images etc in Arduino sketch
  • How to do simple minification of server contents
  • How to use Gzip compression on minified contents
  • How to use proper HTTP headers in Arduino sketch for caching static server resources
  • How to use SPIFFS as server contents storage space to allow all program memory space to be utilized by Arduino sketch. 

You will also be able to utilize this compression technique with any embedded platform like Arduino Ethernet/Wifi shields, Mbed, PIC18F97J60 (or any other Microchip Ethernet controller like ENC28j60), STM32F407 (or any other STM32 controller) etc.

To sum up, you will be able use GZIP compression whenever you are coding in C/C++ for any embedded platform, and right now, we are going to test it on Espressif ESP8266 SoC. 

This is going to be real simple but many people have no idea how to do it, and I'm sure anyone can learn it in few minutes.

Please note that this is not a web development course, rather it will teach you best and easiest possible way to handle web contents in Arduino Sketch.

You will get complete webserver code and Arduino sketch that you can modify according to your requirements. Please check introductory lecture that shows how this webserver works. 

Which ESP8266 board you need for testing as there are many available?

You may use any ESP board that have multiple IO pins, not necessarily Nodemcu.

Happy learning.

CCNA Quiz Questions: Exam prep. Get ready for your exam!

Are you ready for the CCNA exam? You sure? Check your knowledge with our CCNA Exam Quizzes. Make sure you're ready!

Created by David Bombal - CCIE #11023, over 15 years of network training experience


Students: 18924, Price: Free

Students: 18924, Price:  Free

CCNA Quiz Questions! Lots of quiz questions with answers. Make sure you are ready to pass your CCNA exam!

Labs! Labs! And more Labs! Get the hands on experience to pass your CCNA exam!

Prepare practically for the Cisco CCNA certification which is the most in-demand networking certification in the world today! Make sure you can pass the Cisco CCNA Routing and Switching 200-125 exam!

This course tests your knowledge of CCNA topics with quiz questions that helps make sure you are ready for the exam!

Ask yourself these questions:

- Are you ready and prepared for the labs in the CCNA exam?

- Are you able to troubleshoot Cisco networks?

- Are you confident with your ability to configure networks as required by Cisco to pass the CCNA?


This course helps you prepare for the exam and gain the confidence to pass the exam!

There are many topologies and quiz questions in this course!

Networks are all around us and you are using one right now to access this course.

Imagine for a moment, how different your life would be without  access to Facebook, Snapchat, Google, YouTube, WhatsApp or any of the  other websites on the Internet? How would you live with no Internet?

The Internet is extremely important in modern life today and all  websites and Internet communication relies on networking. This reliance  is only predicted to continue with the growth of the Internet of Things  (IoT) in the next few years.

Without routers, switches, network cabling and protocols like BGP there would be no Internet!

This course will teach you how networks actually work and how you are  able to connect to websites like Facebook, Google, and YouTube.

Companies throughout the world (from the smallest to the largest)  rely on networks designed, installed and maintained by networking  engineers. Join this in demand industry!

Start your journey today learning about networking.

I want to welcome you to this Cisco CCNA Packet Tracer Ultimate labs course! I'm David  Bombal, and I have been teaching networking courses for over 15 years. I  qualified as a Cisco Certified Interwork Engineer (CCIE) in 2003 and  hold with numerous other networking certifications. I'm also a Cisco and  HPE certified instructor where I have trained thousands of networking  engineers in many of the largest companies in the world including  Fortune 100 companies.

The course covers the topics in the Cisco ICND1, ICND2 and CCNA exams.

The ideal student for this course is someone looking to break into  the networking field, someone looking to extend their knowledge from PCs  and servers to networking, or someone interested in getting knowledge  to work in one of the most exciting, most in-demand jobs in IT -  networking.

There are no requirements necessary to enrol in this course, I only ask that you come open minded and ready to learn.

Feel free to take a look at the course description and some of the sample free videos.

I look forward to seeing you on the inside!

CCNA Campus & Ethernet troubleshooting: Cisco CCNA Exam Prep

Prepare for the Campus Ethernet exam topics in the CCNA 200-301 exam. You need to learn Ethernet for the exam

Created by David Bombal - CCIE #11023, over 15 years of network training experience


Students: 18048, Price: Free

Students: 18048, Price:  Free

The Cisco CCNA exam requires that you know how to troubleshoot Ethernet networks. You need to understand ARP, MAC address learning, Ethernet frames and more. You need to be able to troubleshoot Ethernet networks.

In this course you will review multiple Ethernet troubleshooting scenarios and learn how to fix Campus Network issues. You will also learn about the ARP protocol, layer 3 switching, SVIs, routed ports and more.

It's time to get ready for your CCNA exam!

Here is a brief overview of Ethernet from Wikipedia:

Ethernet is a family of computer networking technologies commonly used in local area networks (LAN), metropolitan area networks (MAN) and wide area networks (WAN). It was commercially introduced in 1980 and first standardized in 1983 as IEEE 802.3, and has since been refined to support higher bit rates and longer link distances. Over time, Ethernet has largely replaced competing wired LAN technologies such as token ring, FDDI and ARCNET.

The original 10BASE5 Ethernet uses coaxial cable as a shared medium, while the newer Ethernet variants use twisted pair and fiber optic links in conjunction with hubs or switches. Over the course of its history, Ethernet data transfer rates have been increased from the original 2.94 megabits per second (Mbit/s) to the latest 100 gigabits per second (Gbit/s). The Ethernet standards comprise several wiring and signaling variants of the OSI physical layer in use with Ethernet.

Systems communicating over Ethernet divide a stream of data into shorter pieces called frames. Each frame contains source and destination addresses, and error-checking data so that damaged frames can be detected and discarded; most often, higher-layer protocols trigger retransmission of lost frames. As per the OSI model, Ethernet provides services up to and including the data link layer.

Since its commercial release, Ethernet has retained a good degree of backward compatibility. Features such as the 48-bit MAC address and Ethernet frame format have influenced other networking protocols. The primary alternative for some uses of contemporary LANs is Wi-Fi, a wireless protocol standardized as IEEE 802.11.

Network Protocol Analysis Using Wireshark Part-1

You will effectively be able to use Wireshark and troubleshoot networks with a understanding on how protocols work !

Created by Vinod Senthil - Cyber Security Expert


Students: 15862, Price: $19.99

Students: 15862, Price:  Paid

What is network protocol ?

A network protocol is an established set of rules that determine how data is transmitted between different devices in the same network. Essentially, it allows connected devices to communicate with each other, regardless of any differences in their internal processes, structure, or design.

What is wireshark ?

Wireshark is a GUI network protocol analyzer. It lets you interactively browse packet data from a live network or from a previously saved capture file. Wireshark's native capture file format is pcapng format, or pcap which is also the format used by tcpdump and various other tools.

Wireshark can also be used to intercept and analyze encrypted TLS traffic. Symmetric session keys are stored in the browser, and with the appropriate browser setting (and permission and knowledge of the user) an administrator can load those session keys into Wireshark and examine unencrypted web traffic. Wireshark comes with graphical tools to visualize the statistics. This makes it easy to spot general trends, and to present findings to less-technical management. This is a practical course, so you will explore more.

What will you learn ?

In this course, you will first be introduced to the Wireshark tool. Once you get to know the different features and navigation in Wireshark, we will get into the Analysis of Protocol Structure, where the following protocols would be explained in detail,

  • ARP

  • ICMP

  • IP

  • UDP

  • TCP

  • DHCP

  • DNS

  • HTTP

  • FTP

Wireshark Tutorial – Get Wireshark Certification

Learn Wireshark, the World's Most Popular Network Analyzer! Become Wireshark certified for great paying Wireshark jobs!

Created by COURSE ENVY - COURSENVY - Amazon FBA, Facebook Ads, SMM Expert, Ad Agency


Students: 15700, Price: $49.99

Students: 15700, Price:  Paid


Three reasons to TAKE THIS COURSE right now!

  1. You get lifetime access to lectures.

  2. You can ask me questions and see me respond to every single one of them thoughtfully in the course discussions section!

  3. Learn everything from how to download Wireshark, to advanced Wireshark filters, to various Wireshark tutorials and how to prepare for the Wireshark exam. Take our Wireshark training course so you can begin a high paying career in the field of network analysts.

In this course, you will learn what is Wireshark from beginner level to advanced!

You will be able to monitor various traffic with Wireshark, use Wireshark as a WIFI analyzer. output the data in various formats, learn about using tshark, learn some hacking tips and so much more. Join this course now to learn how to earn a second income with Wireshark!



Start Using Wireshark to Hack like a Pro

Start your first capture, use Wireshark features to understand the data and analyze the network communication

Created by Kevin Cardwell - Computer Security Architect


Students: 14102, Price: $39.99

Students: 14102, Price:  Paid

This course will cover the process for conducting protocol analysis. This will serve as a foundation for the skill required for a number of different types of careers. Protocol analysis is the technique of analyzing what is or has taken place on a network. This is used by Security Operations Center analysts as well as network forensics investigators.

We will take static capture files that you will be provided and show you how to analyze them within the Wireshark tool. You will learn ways to quickly identify anything that is abnormal within a network packet capture. This will provide you with the initial skills for intrusion analysis, and also malware tracking and monitoring.

-The course prepares the student for understanding network protocol analysis

-After the course you will have the initial skills for security or hacking classes 

- Anyone who wants to understand the foundation of security skills and have knowledge for analyzing network traffic as well as potential intrusions will benefit from this course. 

- This course is for beginners or people interested in learning about hacking and don't know where to start.

Master Wireshark 3 in 5 Days

Your ultimate course to becoming a Wireshark expert

Created by Mohamad Mahjoub - Cyber Security Expert


Students: 9695, Price: $19.99

Students: 9695, Price:  Paid

Wireshark is the world’s foremost network protocol analyzer. It lets you see what’s happening on your network at a microscopic level. It is the de facto standard across many industries and educational institutions.

This course will be your go-to guide through the latest release of Wireshark, showing you exactly what you need to do, and do it well, by explaining the fundamental network terminologies, using Wireshark for network analysis, and running through its myriad features. We will begin with a quick introduction to Wireshark and how it is used to capture and analyze your protocol packets. We will then work with the various TCP/IP layers and learn some important network communication techniques. Moving on, we’ll create and work with several Wireshark Filters. You will gain the skills to capture data using the various network protocol techniques, alongside analyzing and troubleshooting your network.

By the end of the course, you will be confident to utilize Wireshark for your network analysis tasks effectively on a day-to-day basis.

Troubleshooting Website Connectivity in a Cloud Envrionment

How to troubleshoot connectivity issues with your website running in the cloud environment

Created by Bobby Malik - Enterprise Cloud Architect


Students: 7527, Price: Free

Students: 7527, Price:  Free

This is a basic course on how to troubleshoot connectivity issues with website running in a cloud environment. You learn about basic IP troubleshooting using ping, traceroute, nslookup etc. and advanced tools such as Wireshark and TCPDump analyzer tools and the Stackdriver tool from Google CLoud Platform. Although this course is based on Google Cloud Platform, all troubleshooting tools (including Stackdriver) can used to monitor and troubleshoot AWS environment as well.

Cisco | Data Encapsulation 101

Cisco CCNA exam objectives - Learn how data is encapsulated and communicates across networks using labs and wireshark!

Created by Keith Gebhardt - Network Engineer - Bootcamp Instructor


Students: 7324, Price: $19.99

Students: 7324, Price:  Paid

Welcome everyone!

In this course you will be learning the basics of Data Encapsulation so you can understand how our data learns the information it needs to be transmitted across the network, using various ports, protocols, addressing, and standards.

I will present this information to you in three formats so you do not get bored and you are engaged in the material I am presenting to you

  • PowerPoint Slides
  • Whiteboard drawings
  • Virtual Labs  

Join the STUDENTS that LEARN and SUCCEED (Reviews are from all of my courses)!

★★★★★   Really enjoyed the network diagrams and detailed explanations. I would take more courses from this instructor!

★★★★★  Great course and excellent teaching methodology!

★★★★★  Love the way Keith teaches. He phrases concepts in a manner that is easy to follow and understand!

★★★★★ Great course! Definitely will recommend this to others. If you like non dry material with good overall explanations and not just explanations written from a book, then take this course!

Course Information:

For this course you will need to have a basic understanding of networking fundamentals. If you don't, you can always take my "Cisco Networking Introduction" course available here on Udemy. This course has over 9.5 hours of video lectures and is made up of about 2/3 of labs so you become fluent on configuring Cisco routers and switches.

You will need to download:

  • Cisco Packet Tracer - A virtual network simulator, available for FREE download
  • Wireshark - A packet capture application, available for FREE download
  • Data Encapsulation 101 eBook - Available in Lecture 2 "Overview & Requirements"  for  FREE download

Students can expect:

  • To have a full understanding of Data Encapsulation which is directly related to Cisco's CCNA Certification Exam objectives. 
  • Students will be given a review on some key network fundamental topics directly related to data encapsulation and for this course.
  • Students will have the necessary knowledge needed to discuss data encapsulation with peers, and provide informative information regarding details pertaining to the data being sent across networks. 

In addition, Students will learn:

  • How to use Cisco Packet Tracer to capture virtual lab network traffic
  • The basics of Wireshark so they are familiar with navigating the application, and know how to capture traffic.
  • Students will learn how to capture Switch and Router passwords using Wireshark.

Subscribe on YouTube:

Subscribe to LearnTech Training on youtube as we will be uploading many videos for all areas of Technology that include FREE Lectures, LABS, and Promotional Offers for future courses we create!


Please do not forget to rate this course. We use the ratings to determine if building courses such as this will be worth our time in the future. Note: If you feel this course is not worthy of a good review - please, let me know so I can resolve the issue and we can avoid negative reviews!

Thank you for choosing LearnTech Training with myself, Keith Gebhardt, to be your instructor for this course. If you have any questions, comments, or concerns - please ask.

Keith Gebhardt

Getting Started with Cisco Modeling Labs (CML 2 / VIRL 2)

Cisco Modeling Labs (CML 2) virtualizes Cisco IOS networks and helps prepare for your CCNA, CCNP or DevNet exams!

Created by David Bombal - CCIE #11023, over 15 years of network training experience


Students: 6537, Price: Free

Students: 6537, Price:  Free

Cisco Modeling Labs (CML 2) is here! You can virtualize Cisco networks easily using CML or learn network automation and network programability with Python or Ansible. If you are studying for your CCNA 200-301 exam, or CCNP exams or even for your Cisco DevNet exams, CML can help you prepare. The sofware is much more powerful than Cisco Packet Tracer and supports a whole range of Cisco devices and network topologies.

All the following Cisco images included:

- IOSv

- IOSvL2

- NX-OSv

- ASAv

and many more!

Learn technologies such as Python, Ansible, Spanning-Tree, OSPF, EIGRP, BGP, Etherchannel and many more using Cisco CML.

Ethical Hacking and Threat Hunting using Wireshark

Learn Wireshark to detect malicious traffic in the enterprise network using various Threat hunting techniques.

Created by Rajneesh Gupta - Cyber Security Practitioner and Instructor


Students: 5468, Price: $19.99

Students: 5468, Price:  Paid

Threat hunting is the practice of proactively searching for cyber threats that are lurking undetected in a network. Cyber threat hunting digs deep to find malicious actors in your environment that have slipped past your initial endpoint security defenses.

In this course, you'll learn to use Wireshark tool for threat hunting in enterprise network. While there are a number of great resources available about what hunting is and how it can assist you, it might be challenging to cross over from the realm of the theoretical into the practical. As any hunter will tell you, orientation and planning is one of the critical aspects of effective threat hunting. This guide will help you orient and plan by laying out some basic tips and instructions on how to direct your hunting activities. It will also give you direction on how to practically carry them out using a variety of hunting techniques. Threat hunting has been around for a while, but it has only recently become a focus of modern enterprise Security Operation Centers (SOCs). Hunting can revolutionize the threat detection efforts of an organization, and many have already recognized that proactive hunting needs to play a role in their overall detection practices (a common mantra one often hears is “prevention is ideal but detection is a must”). According to a recent survey on threat hunting conducted by the SANS institute, 91% of organizations report improvements in speed and accuracy of response due to threat hunting. It’s clearly worth your time, but it’s also worth knowing what exactly you’re investing in. Before going any further, let’s take a look at 3 common myths about hunting that will help clarify what it is.

Section 1: Introduction

Section 2: Getting started with Wireshark

Section 3: Threat Hunting

Mastering Wireshark 2

Secure your network with ease by leveraging this step-by-step tutorial on the powerful Wireshark 2

Created by Packt Publishing - Tech Knowledge in Motion


Students: 4707, Price: $109.99

Students: 4707, Price:  Paid

Wireshark is a popular and powerful tool used to analyze the amount
of bits and bytes that are flowing through a network. Wireshark deals
with the second to seventh layer of network protocols, and the analysis
made is presented in a human readable form.

Through this video,
you will gain expertise in securing your network using Wireshark 2. At
the start of the video, you will be taught how to install Wireshark, and
will be introduced to its interface so you understand all its
functionalities. Moving forward, you will discover different ways to
create and use capture and display filters. Halfway through the video,
you’ll be mastering the features of Wireshark, analyzing different
layers of the network protocol, and looking for any anomalies. You will
also learn about plugins and APIs.

As you reach to the end of the
course, you will be taught how to use Wireshark for network security
analysis and configure it for troubleshooting purposes.

About The Author

Andrew Crouthamel is an experienced Senior Network Engineer and IT trainer who resides in Doylestown, PA, and currently works with organizations such as NASA, ESA, JAXA, Boeing, and the US Air Force. His passion for teaching shows in his courses, which are filled with excitement and real world anecdotes.

Wireshark Crash Course

Learn hands on network analysis start to your journey towards a career in network engineering and cyber security

Created by Kyle Slosek - IT Security Ninja - CISSP, GCIH, GPEN, GWAPT, GXPN


Students: 4585, Price: $29.99

Students: 4585, Price:  Paid

Wireshark is the most widely used network capture and protocol analyzer on the market. It is used by IT and Network administrators to troubleshoot network connectivity issues and by Network Security analysts to dissect network attacks. This free and open source application is so widely used in the industry because it works. It is cross platform, meaning that it runs on Windows, Mac, Linux, and FreeBSD.

This course is an introduction to the application and goes over the basics to get you started capturing and analyzing network traffic. It will build your base by explaining the theory behind how networks work and then get you into real-world applications of the software.

In this course you will learn:

  • The basics of how networks operate
  • How to capture traffic on Wireshark
  • How to use display and capture filters
  • How to use command line Wireshark to work with large packet captures

Computer Network: Networking fundamentals + Wireshark Basics

Learn Computer Networks fundamentals and Wireshark Basics; Build Strong, Successful Foundation in Computer Networking

Created by Engineering Mentor - Courses for IT students


Students: 4122, Price: $99.99

Students: 4122, Price:  Paid

Computer Network: Networking Fundamentals + Wireshark Basics (Recently updated : Nov 30, 2015!)

What's New (Bonus): Captions for all the lectures!

This Computer Network Course will teach all the fundamentals about Computer Networking; From explaining Computer Networks basics, communication models and detailed lectures on Layers of a network. This course has illustrative and animated diagrams to help you understand the concepts in an easier way. From solving network related problems to discussing applications of these concepts, we have covered the practical aspects of networking. Plus you get our newly added bonus section on Wireshark Packet Analyzer Tool!

Why take this Course?

The 20th Century has all been about information gathering, processing and distribution. In the past few decades, the world has seen tremendous growth in these fields, from telephone networks to radio and television, from highly centralized huge computers to the smart-phones and smart-watches of today. The internet has been instrumental in connecting this world together, to billions of people and millions of devices. And this trend will keep growing rapidly throughout the 21st century too!

With thousands of businesses and millions of devices using networking for operations, Computing Networking is one of the most essential fields for study for any IT aspirant. The internet revolution has made it virtually the most essential domain knowledge to possess for everyone today.

How is this course designed?

This Course is structured into following sections:

  1. Overview: This section introduces you to the course, provides information about the author, course structure and gives you answers to some of the frequently asked questions by students.
  2. Network basics: This section provides fundamental information on computer networks. Network topologies, different types of networks like LAN, WAN, MAN and wireless networks are explained. One of the most important communication model of computer networks, the OSI Reference Model is discussed. Having the knowledge on OSI Model helps in understanding network functionalities better.
  3. Physical Layer: This section deals with techniques like Switching and Multiplexing which focus on effectively utilizing the existing bandwidth to accommodate the high rate of data communication.
  4. Datalink Layer: This section begins with a lecture on framing, a technique to demarcate the frame boundaries. Later we discuss the flow and error control mechanisms, different error detection and correction techniques like Parity Check, Checksum, CRC and Hamming Codes.
  5. Network Layer: In this section header formats of IPv4 and IPv6 datagrams are explained.
  6. Transport Layer: This section explains the Transport Layer protocols that provide service to the Network Layer. Header format, features and services provided by TCP and UDP are explained.
  7. Application Layer: This section begins with Cryptography basics, private key encryption and public key encryption. Encryption algorithms like RSA are explained with examples. Also, File Transfer Protocol is explained.
  8. Bonus - Wireshark Packet Analyzer Tool(Worth $49): Wireshark is the most popular network packet capture and analyzing tool. This section will provide you Wireshark basics like what is Wireshark, Wireshark Installation Setup (windows), Capturing and Analyzing packets with Wireshark Tool.
  9. Bonus - Audio Transcripts (Worth $49): Download the audios of all the lectures and listen to them whenever you can, so that your brain creates visual representation of the concepts and helps you cement this concepts in your mind!
  10. Bonus - Course Completion Bonus: Complete the course and get huge discounts on our other courses! This bonus will help you save 100s of Dollars on our other courses. Don't miss this one!

So Dive into the world of computer networks, and gain all the fundamental knowledge required to pursue your career in computer networking domain.

Learning Path: Wireshark -The Advanced Network Analysis Tool

Analyze your organization’s traffic with ease using one of the most popular and powerful network analyzer, Wireshark 2.

Created by Packt Publishing - Tech Knowledge in Motion


Students: 3753, Price: $129.99

Students: 3753, Price:  Paid

Yes, we do agree network analysis might seem very daunting. But
thanks to Wireshark 2, it’s no longer a challenge. The improved GUI, the color
coding, the human-readable output are only a few of the many features that make
Wireshark a popular choice among its contenders.

This Learning Path will
introduce you to the basic features of Wireshark 2 and teach you how to
leverage these features in the optimal way to organize network traffic.

Yes, this is not a course, it’s a Learning Path.

Packt’s Video Learning Paths are an amalgamation of multiple
video courses that are logically tied together to provide you with a larger
learning curve. 

This Learning Path will brush through the basic networking
concepts, and then introduce you to the user interface of Wireshark. Later it
moves on to the different ways to create and use the capture and display
filters in Wireshark. Also, you’ll be mastering its features, analyzing
different layers of the network protocol, and looking for any anomalies.

By the end of this Learning
Path, you will be able to use Wireshark for network security analysis and
configure it for troubleshooting purposes.

About the authors:

For this Learning Path,
we have combined the best works of extremely esteemed authors: Alex Kuzmenko
and Andrew Crouthamel.

Alex has more than
16 years of engineering hands-on experience in Telecom field. He used Wireshark
for mobile network integration, testing, and troubleshooting for more than 5
years in his job in Ericsson, North America. He also had 6 years of technical
training experience preparing and conducting courses related to mobile packet
networks in Europe and Asia.

Andrew is an
experienced Senior Network Engineer and IT trainer who resides in Doylestown,
PA, and currently works with organizations such as NASA, ESA, JAXA, Boeing, and
the US Air Force. His passion for teaching shows in his courses, which are
filled with excitement and real world anecdotes.

Mastering Network Troubleshooting with Wireshark

Solve network problems and improve your understanding of network protocols by learning Wireshark from an expert.

Created by Brian Hill - Author, IT Instructor, and SME


Students: 3096, Price: $29.99

Students: 3096, Price:  Paid

Protocol analysis is a complicated, and often intimidating, subject. Many engineers, even ones with significant experience, feel powerless and lost when confronted with the sea of data that a network capture can provide. Most courses approach this problem with more overload; diving into each menu item and option with detailed explanations. But when you get done with those courses, you still find yourself wondering “How do I actually use this stuff to resolve problems?”

This course is different

This course is specifically designed to walk you through the mindset and methodology an expert uses to diagnose problems with Wireshark. No time is wasted on options or features that are not heavily used. Instead, the key skills are trained, with a focus on making sure you understand why this skill is useful, and how the skill is used. Real problems are examined from real network captures, and the techniques used to diagnose these problems are laid bare.


Throughout this course, you will open the same captures as the instructor, and use the same techniques he uses to see the same results he gets. In this course, you will learn:


  • How to install Wireshark to both take and view captures


  • How to take the best possible captures, maximizing signal and reducing noise


  • How to filter captures using both individual and combined filtering, to arrive at the exact information you need


  • Advanced techniques like comparison captures and ring buffering to diagnose complex corner cases


  • How to use RFCs to understand the function of the protocols you are examining


  • How to use captures to troubleshoot both common and complex problems, such as TCP retransmissions and Black Hole routers

Additionally, you will receive access to all of the example traces used in the course, so that you can follow along as the instructor walks you through his techniques. And all of this is provided in high-quality video, allowing you to complete the course at your own pace.


Finally, in addition to the course, you will receive:


  • Direct access to the instructor

  • Updated content

  • A certificate of completion

  • 30-day, money-back guarantee

All you need to take the course is a computer capable of running Wireshark (Windows, Linux, or Macintosh), and an Internet connection. 

Just click Buy Now, and you can begin immediately.

Free Tools for Penetration Testing and Ethical Hacking

Learn hackers`Web Hacking, Network Scanning and Password Cracking tools such as Wireshark, Nmap, Metasploit, Maltego

Created by Muharrem AYDIN - Computer Engineer, Ethical Hacking, Cyber Security Expert


Students: 3042, Price: $99.99

Students: 3042, Price:  Paid


Welcome to my "Ethical Hacking and Penetration Testing with Free Tools" course.

My name is Muharrem Aydin ( white-hat Hacker ), creator of the three best-selling Ethical Hacking and Penetration Testing courses on Udemy.

This time I’ve designed my "Ethical Hacking and Penetration Testing with Free Tools" course, for YOU! This course is for everyone! If you don’t have any previous experience, not a problem!  This course is expertly designed to teach everyone from complete beginners, right through to pro hackers. You'll go from beginner to extremely high-level and I will take you through each step with hands-on examples.

In this course, I have listed the web’s favorite ethical hacking / pentesting hacker tools as used by hackers, geeks, ethical hackers and security engineers (as well as black hat hackers).  

★★★★★ All tools are free. So you don’t need to buy any tool or application. ★★★★★ 

You will learn the theory, background and trendy free tools used to leverage the most updated attacks in the hacking world with real-world examples and demos.

In this course, you will first learn how to set up a lab ( Kali Linux ) and install needed software on your machine. Then you will learn;

Network Scan Tools 

Wireshark, Hping, Nmap, Zenmap

Vulnerability Scan Tool

  • Nessus

Exploitation Tool 

  • Metasploit Framework

Password Cracking Tools

  • Hydra, Cain and Abel, John The Ribber

Information Gathering Over the Internet Tools 

  • SearchDiggity, Shodan, Maltego, 

Web Hacking Tools 

  • Burp Suite, ZAP, Beef, SQLMap

Social Engineering and Phishing Tools 

  • Veil, Fatrat, Empire Project 


 Network Layer & Layer-2 Attacks Tools

  • Yersinia for DHCP Starvation

Here is the list of  what you’ll learn by the end of course,    

Setting Up The Laboratory
Set Up Kali Linux from VM Image

Set Up Kali Linux from ISO File
Set Up a Victim: Metasploitable Linux
Set Up a Victim: OWASP Broken Web Applications
Set Up a Victim: Windows System

Network Scan Tools

Wireshark: Sniffing the Network Traffic
Wireshark: Following a Stream
Wireshark: Summarise the Network
TCPDump in Action
Hping for Active Scan and DDoS Attacks

Network Scan Tools - NMAP
Ping Scan to Enumerate Network Hosts
Introduction to Port Scan
SYN Scan
Port Scan Details

TCP Scan
UDP Scan
Version Detection
Operating System Detection
Input & Output Management in Nmap
Introduction to Nmap Scripting Engine (NSE)
Nmap Scripting Engine: First Example
Nmap Scripting Engine: Second Example
Some Other Types of Scans: XMAS, ACK, etc.
Idle (Stealth) Scan

Vulnerability Scan Tool: Nessus
Nessus: Introduction
Download & Install Nessus
Creating a Custom Policy

Exploitation Tool: Metasploit Framework (MSF)
MSF Console: Search Function & Ranking of the Exploits
MSF Console: Configure & Run an Exploit
Meeting with Meterpreter

Meterpreter Basics on Linux
Meterpreter Basics on Windows
Meterpreter for Post-Exploitation
Incognito Extension of Meterpreter
Mimikatz in Meterpreter

Post Modules of Metasploit Framework (MSF)
Managing Post Modules of MSF

Password Cracking Tools
Hydra: Cracking the Password of a Web App
Hydra: Online SSH Password Cracking
Cain and Abel: Install & Run
Cain and Abel: Gathering Hashes

Cain & Abel: A Dictionary Attack
Cain & Abel: A Brute Force Attack
John the Ripper

Information Gathering Over the Internet Tools
SearchDiggity: A Search Engine Tool

Information Gathering Over the Internet Tools
SearchDiggity: A Search Engine Tool
FOCA: Fingerprinting Organisations with Collected Archives
The Harvester & Recon-NG
Maltego - Visual Link Analysis Tool

Web App Hacking Tools
Burp Suite: Intercepting the HTTP Traffic
Burp Suite: Intercepting the HTTPS Traffic
Zed Attack Proxy (ZAP): A Web App Vulnerability Scanner
ZAP: Installation & Quick Scan
ZAP: As a Personal Proxy
ZAP: Intercepting the HTTPS Traffic
ZAP: An Advanced Scan - Scanning a Website that Requires to Login
SQLMap: Leveraging an SQL Injection Exploit

Social Engineering and Phishing Tools
Veil: Introduction
Veil: In Action
FatRat: Introduction

FatRat: In Action
Empire Project: Installation
Empire in Action
Social Engineering Toolkit (SET) for Phishing

Network Layer & Layer-2 Attacks Tools
GNS3: Let's Create Our Network - Download & Install
GNS3: Setting Up the First Project
GNS3: Tool Components
GNS3: Building the Network

GNS3: Attaching VMware VMs (Including Kali) to the Network
GNS3: Configuring Switch & Router (Cisco) and creating VLANs
Macof for MAC Flood
Ettercap for ARP Cache Poisoning

You'll also get:

  • Lifetime Access to The Course

  • Fast & Friendly Support in the Q&A section

  • Udemy Certificate of Completion Ready for Download

Enroll now to become professional Ethical Hacker!

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.

Wireshark for ethical hackers

Wireshark Hacking

Created by Alex Thomas - Penetration Tester


Students: 3026, Price: $19.99

Students: 3026, Price:  Paid

Wireshark is a popular and powerful tool used to analyze the amount of bits and bytes that are flowing through a network. Wireshark deals with the second to seventh layer of network protocols, and the analysis made is presented in a human readable form.

This course will cover wireshark from the eyes of an ethical hacker. Wireshark in commonly used by malware analyzers, blue teams, and other security defenders. This tool can also be used by hackers to perform malicious actions. This course will teach you how to use wireshark in an offensive way to hack your targets.

Be prepaid to bring your grey hat when taking this course!

Introduction To Wireshark – The Essential Beginners Guide

Discover Tried and Tested Methods To Analyze and Troubleshoot Network Packets Using Wireshark

Created by Nikhil Parekh - Teaching 191,513 Students in 46 Courses, Celebrity Advisor


Students: 2629, Price: $89.99

Students: 2629, Price:  Paid

Course Updated 7 July 2016

Why are 50,804 students wanting me to mentor them in 42 Udemy courses?50,804 students have started learning from me since August 7th 2015. Shouldn't you find out why?

This is NOT the course for you if you want to read articles on Wikipedia and think you know how to use Wireshark. This course will explain theory and show you in detailed practical lessons how to use Wireshark.

Here's a 5 Star Review from C R Stewart:


I like the way the instructor took the time to explain
and reference each segment. I now have a clearer understanding of how
to analyze a protocol packet file capture. Great beginner course!"

This is the essential guide to learn Wireshark. Take this course and learn everything you need to start using Wireshark to analyze network packets. I have worked in the computer security and hacking industry for a number of years starting in 1995. I have worked with major software companies, banks, transport industries, airlines, retail giants. We used software tools to analyze network data and even showed businesses how we were able to bypass physical security and gain access to their facilities and premises.

This course will share some of my security insights and, more importantly, you will learn how to start using Wireshark properly.

Wireshark is a free, open-source network packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education.

Once you understand Wireshark, you will be able to apply for network administrator type roles or even assist the company you are working with currently to get a better understanding of problems on their network.

Understand this - Wireshark is extremely important in the marketplace currently and given our continuous increase in demand for internet and wifi services, there are lots of businesses who are very weak in their network security practices. This opens up a goldmine of opportunities for you once you learn Wireshark.

You will get an understanding of basic network concepts and the OSI model. You will get an overview of Wireshark, learn how to install Wireshark, and learn how to analyze packets on the network. Even more, you will learn how hackers can use Wireshark to steal information.

Further, we will cover filtering so you get a better understanding how to apply filters and learn how to apply filters to specific IP addresses.

There is a tremendous opportunity right now to make a career in network administration and network security. Learn how to help your existing company or even gain a higher paying network administrator role. You could even get a number of freelance opportunities that pay extremely well.

Take this course today and improve your packet analyzing skills with Wireshark.

Free CCNA 200-301: Retro Networking with 10Base5 & 10Base2

See a working Retro Network using 10Base5 and 10Base2. This will help you prepare for your CCNA exam!

Created by David Bombal - CCIE #11023, over 15 years of network training experience


Students: 2517, Price: Free

Students: 2517, Price:  Free

The 1970s is alive in 2020!

You may have read about it in books. Or seen PowerPoint slides about.

But, have you seen a fully working 10Base5 and 10Base2 retro network? This stuff is from the 1970s, but I created one in 2020!

See practical demonstrations of:

- Bus Network

- Vampire taps

- Transceivers

- 10Base5 cabling

- 10Base2 cabling

- Windows 3.11 connecting to the Internet

- Ethereal (predecessor to Wireshark)

- Windows 98 10Base5 computers

- VNC and PCAnywhere controlling old machines from a Mac

This is a true working example of what networks looked like in the very beginning.

Developing and Hosting a Short Lived Website for a Free

Installing SSL certificate for Spring Boot web application

Created by Parth Shah - Professor at CHARUSAT


Students: 968, Price: Free

Students: 968, Price:  Free

Nowadays so many tools and technologies are available which can be used for free for a limited amount of time. Sometimes it becomes a requirement to create a short-lived secure web application for constrained budget events or something else. So this is the right course that has the above-mentioned requirement. In this course, learning will learn how to clone the spring boot project into the Eclipse IDE. The project is already available on the Git repository. The spring boot application will be deployed to the AWS EC2 instance to make it publicly available. You require to have your own AWS credentials. Traffic capture can be done using a utility like Wireshark; hence the publicly available web application needs secure communication, hence self-signed certificate creation is taught. To create a self-signed certificate ketol utility of JDK is used. The deployed application is accessible through an IP address which is no the proper way to make the application public. Freenom is used to get free domain registration. The self-signed certificate is not authorized hence free SSL certificate will be created on ZeroSSL. OpenSSL is used to convert the certificate generated by ZeroSSL into the PKCS format. The certificate generated from ZeroSSL is authorized and can work with the spring boot application.