Title rated 0 out of 5 stars, based on 0 ratings(0 ratings)
eBook, 2015
Current format, eBook, 2015, , Available.
eBook, 2015
Current format, eBook, 2015, , Available. Offered in 0 more formats
Key Features Book Description What you will learn Familiarize yourself with the robust features offered by Wireshark Use the powerful commandline utilities shipped with Wireshark Analyze numerous threats to network security using Wireshark Investigate attacks performed using popular security tools such as Nmap, Nessus, Metasploit, and more Solve realworld CTF challenges using Wireshark Create your own securityrelated profile in Wireshark Configure Wireshark for effective network troubleshooting Get accustomed to common scenarios faced by security analysts Analyze malware traffic successfully by using Wireshark Unearth anomalies hampering the speed of network communications Who this book is for
If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.
From the community