~Get Your Files Here !/01. Course Overview/01. Course Overview.mp43.37MB
~Get Your Files Here !/02. Top Five Wireshark Features for Forensic Analysis/02. Introduction to Cyber Security Analysis with Wireshark.mp45.18MB
~Get Your Files Here !/02. Top Five Wireshark Features for Forensic Analysis/03. Lab 1 - Creating a Security Profile.mp426.29MB
~Get Your Files Here !/02. Top Five Wireshark Features for Forensic Analysis/04. Lab 2 - The Statistics View.mp422.1MB
~Get Your Files Here !/02. Top Five Wireshark Features for Forensic Analysis/05. Lab 3 - Configuring GeoIP Location Resolution.mp417.38MB
~Get Your Files Here !/02. Top Five Wireshark Features for Forensic Analysis/06. Lab 4 - Configuring Custom Columns.mp420.81MB
~Get Your Files Here !/02. Top Five Wireshark Features for Forensic Analysis/07. Lab 5 - Configuring Name Resolution.mp423.35MB
~Get Your Files Here !/02. Top Five Wireshark Features for Forensic Analysis/08. Lab 6 - Exporting HTTP Objects and Files.mp413.65MB
~Get Your Files Here !/02. Top Five Wireshark Features for Forensic Analysis/09. Lab 7 - Reassembling and Exporting FTP Files.mp418.26MB
~Get Your Files Here !/02. Top Five Wireshark Features for Forensic Analysis/10. Module Summary.mp4832.65KB
~Get Your Files Here !/03. Filters and Coloring Rules for Spotting Suspect Traffic/11. Intro to Filters and Coloring Rules in Wireshark.mp42.43MB
~Get Your Files Here !/03. Filters and Coloring Rules for Spotting Suspect Traffic/12. Analyzing Unusual DNS Activity.mp42.6MB
~Get Your Files Here !/03. Filters and Coloring Rules for Spotting Suspect Traffic/13. Lab 7 - Part 1 - Filtering for Unusual DNS Activity.mp434.53MB
~Get Your Files Here !/03. Filters and Coloring Rules for Spotting Suspect Traffic/14. Lab 7 - Part 2 - Filtering for Unusual DNS Activity.mp48.03MB
~Get Your Files Here !/03. Filters and Coloring Rules for Spotting Suspect Traffic/15. Analyzing Traffic from Unusual Country Codes.mp41.48MB
~Get Your Files Here !/03. Filters and Coloring Rules for Spotting Suspect Traffic/16. Lab 8 - Filtering for Traffic Based on Country Location.mp425.45MB
~Get Your Files Here !/03. Filters and Coloring Rules for Spotting Suspect Traffic/17. Analyzing Suspect TCP Behavior and Flags.mp43.65MB
~Get Your Files Here !/03. Filters and Coloring Rules for Spotting Suspect Traffic/18. Lab 9 - Part 1 - Filtering for Suspect TCP Behavior.mp424.51MB
~Get Your Files Here !/03. Filters and Coloring Rules for Spotting Suspect Traffic/19. Lab 9 - Part 2 - Filtering for Suspect SSH Traffic.mp45.41MB
~Get Your Files Here !/03. Filters and Coloring Rules for Spotting Suspect Traffic/20. Lab 10 - Filtering for Executable Files.mp418.78MB
~Get Your Files Here !/03. Filters and Coloring Rules for Spotting Suspect Traffic/21. Lab 11 - Analyzing Traffic over Non-standard Ports.mp425.77MB
~Get Your Files Here !/03. Filters and Coloring Rules for Spotting Suspect Traffic/22. Summary.mp4745.67KB
~Get Your Files Here !/04. Configuring Wireshark for Decrypting Traffic/23. Module Introduction.mp42.02MB
~Get Your Files Here !/04. Configuring Wireshark for Decrypting Traffic/24. Capturing the TLS Session Keys.mp43.73MB
~Get Your Files Here !/04. Configuring Wireshark for Decrypting Traffic/25. Lab 12 - Decrypting TLS Traffic in Wireshark.mp48.03MB
~Get Your Files Here !/04. Configuring Wireshark for Decrypting Traffic/26. Course Summary.mp41.51MB