Become a member
Online Access to 1000+ Courses!

TCP/IP Packet Analysis Course

5hrs (60 Lessons) 2008-09-11

This Course can only be played using a subscription. You can play only first 3 chapters for free. Click Here to avail a subscription
Both network administrators and IT security professionals must have the fundamental knowledge of TCP/IP to do their jobs. With that comes a necessity to be able to analyze TCP/IP traffic in order to troubleshoot network problems, analyze attacks, and better understand and secure their systems. Veteran VTC author, Bobby Rogers, will provide in-depth explanations for beginners and seasoned network professionals alike to enable them to understand the complex techniques of TCP/IP traffic analysis. To begin learning, simply click on the TCP/IP Packet Analysis movie links.

Welcome to the Virtual Training Company course TCP Packet Analysis. I'm Bobby Rogers and I'm going to be your guide through this course. What we're going to cover during this particular VTC course is, as the title suggests, TCP/IP Packet Analysis. This is not a beginner course. It assumes that you have some fundamental knowledge of TCP/IP and of basic networking technologies. Having said that, if you have those basic experiences with networking, that basic knowledge, you should do very well in this course. What we're going to be looking at is a beginning to end examination of TCP packets. We're going to look at how they're created, how they're captured and how you can analyze these to help you in your daily network job. They can also help you in security analysis, security engineering. You can use this knowledge to help you troubleshoot networks and so forth. Let's take a quick look at what we're going to be talking about, some of the concepts and topics that we're going to be looking at during this course. First of all, we're going to do a course outline, which is what we're doing now. Then we're going to look at some basic TCP/IP concepts. Now, once again, you need to have some basic background and knowledge in both TCP and networking in order to do well in this course. But during this part of the course, during the TCP Concepts and the later sessions immediately after it, we're going to be looking at basics. During TCP/IP Concepts, we're going to be reviewing the OSI Model and the TCP/IP Model. We're not going to go in depth on them. We're just going to do a basic review so you know where we're coming from. Then we're going to look at the basics of TCP and UDP. We'll look at the basics of the protocols themselves and tell you what the differences are and then we'll go and look at the packet construction itself of TCP and UDP packets since they factor very heavily into what we're going to be doing. We'll also look at the basics of IP Protocols. We'll look at ICMP and we'll look at IPSec, so you kind of know how to analyze those particular packets. We'll also look at the various packet analysis tools out there and we'll look at the tools that help create traffic, generate traffic, capture it and analyze it. A large part of the course will be conducted using the popular Wireshark Packet Sniffer. We'll also start capturing packets for you to look at. We have some good lab setup with some good computers on lab networks and we will be able to control what we send and receive across so you don't get a bunch of garbage in there. You can actually see what we're doing and we'll capture these packets for later analysis and examination. Then we'll move on into analyzing TCP/IP traffic. We'll start with the basics and show you how you should start looking at TCP/IP traffic once you capture it, what you should start looking for and the different things that will help you analyze TCP/IP traffic. We'll also look at common protocols that we'll see every day in our daily lives; our daily jobs; HTTP, FTP and HTTPS and so forth. Then we're going to turn our attention to looking for traffic that's not normal; things that could be the result of a network problem or it could be the result of malicious traffic, such as an external attack going on. We'll look at that kind of traffic and kind of see how we can use packet analysis to tell us if our networks are being attacked or not. Then we'll take a look at wireless traffic. Now, wireless traffic is a bit of a different animal to examine, but we're going to go through the basics of examining both WEP and WPA traffic so you can see kind of what it looks like. Then we'll take a look at the practical applications of traffic analysis. We'll give you some examples of what you can do with this knowledge every day in your job, such as network security, network troubleshooting and so forth. Then we'll do a quick course wrap-up, we'll kind of recap everything we've talked about, then I'll tell you a little bit about myself as the author. So sit back and relax. I'm looking forward to what should be a very good course, a very fun course and I hope you think it will be a good and fun course as well and let's go ahead and get started.  

  • Course: TCP/IP Packet Analysis
  • Author: Bobby Rogers
  • SKU: 33909
  • ISBN: 1-934743-95-X
  • Work Files: Yes
  • Captions: No
  • Subject: Networking & Security
  • The first 3 chapters of courses are available to play for FREE (first chapter only for QuickStart! and MasterClass! courses). Just click on the movie link to play a lesson.
Course outline
Introduction

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
TCP/IP Concepts
The OSI Model (06:40)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Basics of TCP & UDP Protocols

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
TCP & UDP Ports (07:10)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Windowing (02:22)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
TCP Flags (02:27)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
TCP & UDP Packet Construction

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Basics of IP Protocols
IP Protocols (04:23)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
ICMP (07:03)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
ARP (04:26)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Packet Analysis Tools
Wireshark (07:50)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Hping2 (05:48)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Packet Capturing

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Analyzing TCP/IP Traffic

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Analyzing Common Protocols
FTP (06:47)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Telnet (05:27)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
HTTP (05:54)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
HTTPS (06:26)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
SMB & NetBIOS (04:46)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Looking for Malicious Traffic

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
TCP Flags (05:31)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
ICMP Attacks (06:27)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Examining Wireless Traffic

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Practical Applications of Traffic Analysis

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Course Wrap Up
Wrap Up (04:21)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
About the Author

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference