From the course: Wireshark: Malware and Forensics

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

Next steps

Next steps - Wireshark Tutorial

From the course: Wireshark: Malware and Forensics

Start my 1-month free trial

Next steps

- [Instructor] Thank you for watching. In this course, I covered how Wireshark can uncover advanced persistent threats on the network that elude detection and hide in plain sight. We covered the importance of baselining the network, display and capture filters, and coloring rules to highlight potential malware signatures. We examined unusual traffic and indications of compromise. I discussed ports associated with malware and some common attack signatures. I finished up with some case studies and what to look for when trying to uncover potential problems on your own network. If you're interested in learning more, please check out the IT segment of the library where we add new courses all the time. It's well worth your time to check out any course in the Ethical Hacking series. And if you're a network administrator, you might want to check out my series on CCNA Network Security. And if you want more experience with…

Contents