Network & Security


Wireshark: Packet Analysis and Ethical Hacking: Core Skills

From basic to advanced network analysis using Wireshark! Ethical Hacking using Kali Linux: Passwords, Security, Protocol

4.66 (4407 reviews)


14.5 hours


Oct 2020

Last Update
Regular Price


Unlimited access to 30 000 Premium SkillShare courses

What you will learn

Learn how to troubleshoot networks using Wireshark.

Capture VoIP, OSPF, HTTP, Telnet and many other protocols using Wireshark.

Learn how to use Wireshark for Ethical hacking.

Improve your job prospects by adding Wireshark to your resume.

Understand and interpret network protocols.

Hack Network Protocols using Kali Linux


Learn Wireshark practically. Wireshark pcapng files provided so you can practice while you learn! There is so much to learn in this course:

- Capture Telnet, FTP, TFTP, HTTP passwords.

- Replay VoIP conversations.

- Capture routing protocol (OSPF) authentication passwords.

- Troubleshoot network issues.

- Free software.

- Free downloadable pcapng files.

- Answer quiz questions.

The course is very practical. You can practice while you learn!

Learn how to analyze and interpret network protocols and leverage Wireshark for what it was originally intended: Deep Packet Inspection and network analysis.

I also show you have to hack network protocols using Kali Linux! Hack network protocols like DTP, VTP, STP and DHCP using Ethical hacking tools included in Kali Linux.

Updates: Now includes Python scripting to automatically capture packets from the network using tshark. Lean how to automate your captures and learn how to hack the network using Python and Wireshark.

Protocols we capture and discuss in this course include:

- Telnet




- VoIP






-  VTP




Wireshark: Packet Analysis and Ethical Hacking: Core Skills
Wireshark: Packet Analysis and Ethical Hacking: Core Skills
Wireshark: Packet Analysis and Ethical Hacking: Core Skills
Wireshark: Packet Analysis and Ethical Hacking: Core Skills




Wireshark Installation: Windows

Wireshark Installation: Mac OS

Wireshark Basics

The best way to learn!

Capture frames / packets / segments

Why are no packets captured?

Port SPAN / Mirroring

OSI Model

Make a choice

OSI Model - Part 1 - OSI Model Introduction

OSI Model - Part 2 - OSI Model Layers

OSI Model - Part 3 - Split of concentration

OSI Model - Part 4 - Layer 7 Application Layer

OSI Model - Part 5 - Layer 6 Presentation Layer

OSI Model - Part 6 - Layer 5 Session Layer

OSI Model - Part 7 - Top layers versus lower layers

OSI Model - Part 8 - Transport Layer

OSI Model - Part 9 - Network Layer

OSI Model - Part 10 - Data Link Layer

OSI Model - Part 11 - Physical Layer

OSI Model - Part 12 - Host Communication

OSI Model - Part 13 - Encapsulation

OSI Model - Part 14 - TCPIP versus OSI Model

Wireshark Filters

Wireshark Display filters

Practical Demonstration of Wireshark Display filters

Two types of filters

Wireshark Capture Filters

Wireshark Filters: IP address / protocols

Wireshark: Hacking Passwords

Telnet Password & Data Captures

TFTP Password & Data Capture

FTP Password & Data Capture

HTTP Data Capture

Cisco router HTTP Password Capture

Hacking VoIP

Replay Voice over IP calls (Virtual IP Phones)

Capture and replay voice calls (Virtual & Physical IP Phones)

Protocol Analysis: Can you troubleshoot the network?

DTP Lab: Quiz

DTP Lab: Answers

CDP, LLDP Lab: Quiz

CDP, LLDP Lab: Answers

OSPF Lab: Quiz

OSPF Lab: Answers Part 1

OSPF Lab: Answers Part 2

OSPF Troubleshooting Lab 1: Question

OSPF Troubleshooting Lab 1: Answers

OSPF Troubleshooting Lab 2: Question

OSPF Troubleshooting Lab 2: Answers

OSPF Troubleshooting Lab 3: Question

OSPF Troubleshooting Lab 3: Answers

EIGRP Lab: Questions

EIGRP Lab: Answers

EIGRP Troubleshooting Lab 1: Question

EIGRP Troubleshooting Lab 1: Answers

EIGRP Troubleshooting Lab 2: Question

EIGRP Troubleshooting Lab 2: Answers

BGP Lab: Question

BGP Lab: Answers

BGP Troubleshooting Lab: Question

BGP Troubleshooting Lab: Answers

Wireshark Tips and Tricks

Quick Wireshark Filters

Wireshark Profiles

Wireshark Conversation Filters

Wireshark Statistics

Wireshark Protocol Hierarchy

Wireshark Conversations and IO Graph

Wireshark Flow Graph

tshark and Termshark

Overview and tshark install and packet capture


Python Wireshark scripting

tshark and Pyshark installation

Basic Pyshark testing

Pyshark script

Python Wireshark Password Captures

Lab overview and setup

iPython and interactive OSPF script

OSPF Password Python script

FTP Password Capture Python script

Telnet Password Capture Python Script

Kali Linux: Installation

Import Kali Linux (Windows 10 / VirtualBox)

Kali Linux: Network Attack Demonstrations

Network Overview

DTP Attack Demo

VTP Attack Demo Part 1

VTP Attack Demo Part 2

Spanning Tree Attack Demo

Demo: Mitigation of attacks

Kali Linux: DHCP attacks and Man-in-the-middle attack

Overview of lab

DHCP Starvation attack

Rogue DHCP Server; MITM attack, Wireshark password sniffing

Wireshark Quiz Questions

Don't worry!

Wireshark Quiz 1

Wireshark Quiz 1 Answers

Wireshark Quiz 2

Wireshark Quiz 2 Answers

Wireshark Quiz 3

Wireshark Quiz 3 Answers

Wireshark Quiz 4

Wireshark Quiz 4 Answers

Wireshark Quiz 5

Wireshark Quiz 5 Answers

Wireshark Quiz 6

Wireshark Quiz 6 Answers

Wireshark Quiz 7

Wireshark Quiz 7 Answers

Wireshark Quiz 8

Wireshark Quiz 8 Answers

Wireshark Quiz 9

Wireshark Quiz 9 Answers

Wireshark Quiz 10

Wireshark Quiz 10 Answers

Wireshark Quiz 11

Wireshark Quiz 11 Answers

Wireshark Quiz 12

Wireshark Quiz 12 Answers

Wireshark Quiz 13

Wireshark Quiz 13 Answers

Wireshark Quiz 14

Wireshark Quiz 14 Answers

Wireshark Quiz 15

Wireshark Quiz 15 Answers

Wireshark Quiz 16

Wireshark Quiz 16 Answers

Wireshark Quiz 17

Wireshark Quiz 17 Answers

Wireshark Quiz 18

Wireshark Quiz 18 Answers

Wireshark Quiz 19

Wireshark Quiz 19 Answers

Wireshark Quiz 20

Wireshark Quiz 20 Answers

Wireshark Quiz 21

Wireshark Quiz 21 Answers

Wireshark Quiz 22

Wireshark Quiz 22 Answers

Wireshark Quiz 23

Wireshark Quiz 23 Answers

VTP Theory and demonstrations

Make a choice

VTP Overview

VTP Overview Part 2

VTP Modes

VTP Versions

VTP on real 3750 switch

VTP - Demo: Erase switch config

VTP Pruning

VTP Defaults

VTP Warnings!

VTP Demo: Overview & Switch 1 config

VTP Demo: Autonegotiation S2

VTP Demo: VTP Client

VTP Demo: Client overrides server

VTP Network Meltdown! VLANs removed from database!

VTP Demo: Network Back Again and Transparent Mode

VTP: Physical swtiches auto learn VTP domain

Spanning Tree theory and demonstrations

Spanning Tree Overview

Versions of Spanning Tree

Why is Spanning Tree Required?

BPDUs and Bridge IDs

Demo: STP Root

Root Ports and Designated Ports

Extended Bridge ID


Path Cost Part 1

Path Cost Part 2

Path Cost Part 3

PVST versus RPVST Port States

RPVST and PVST Interoperability and 802.1w and 802.1s Overview

802.1w and 802.1s Overview


Demo: 802.1w

802.1w Link Types

802.1w Proposals

802.1s / MSTP

Spanning Tree Comparison Summary

Port SPAN (Mirroring) theory and demonstrations

SPAN Introduction

SPAN network overview

Tests before SPAN

Configure SPAN

SPAN Ingress Options

SPAN Options

SPAN - Multiple Sessions

BGP theory and demonstrations

BGP and the CCNA

BGP Overview

BGP Looking Glass

GNS3 BGP Part 1

GNS3 BGP Part 2

GNS3 BGP Part 3

GNS3 BGP Part 4

GNS3 BGP Part 5

GNS3 BGP Part 6

GNS3 BGP Part 7

GNS3 BGP Part 8

GNS3 BGP Part 9

GNS3 BGP Part 10

Dynamic Trunk Protocol - DTP

DTP Theory

DTP GNS3 Demo Part 1

DTP GNS3 Demo Part 2

DTP GNS3 Demo Part 3

CCNA Dynamic Trunking Protocol (DTP) Quiz: Can you answer the ccna quiz question

CDP Overview

CDP Introduction

CDP Demo

GNS3 Campus 1: CDP and LLDP (ICND1)

CDP Demo: Basic discovery

CDP Demo: Disable globally and per interface

CDP Demo: Command Options

LLDP Demo: Discover Linux Servers

Port Security

Port Security Overview

Port Security and security mechanisms

MAC addresses Port Security: Static, Dynamic, Sticky

Port Security Demo Part 1

Port Security Demo Part 2

Port Security Demo: Sticky

Port Security Error disable and auto recovery


A8 October 2020

Finally a proper thorough breakdown of highly technical concepts you WILL see in the real world. Having worked in the field for a number of years I found this course a gold mine of information. The practice questions really help to seal in the concepts explained. Excellent course! Highly recommended!

Mike10 September 2020

Always learn from David, have purchased many courses, and now I don't even need to get reviewer opinions I know his courses will be worth the purchase. Best instructor for this stuff if you ask me.

Steve9 September 2020

This course went far beyond using Wireshark, delving into working with Cisco routers. Although I only needed the Wireshark features, I went through the entire course to see what other items I might pick up that could be useful later. David Bombal presents the topics in good detail with clear explanations.

Diogo5 September 2020

David Bombal is definitively the best network teacher of all udemy. This course is awesome as always.

Janneke22 July 2020

Good explanations, very detailed. Helped me to make the most out of my analyses with Wireshark. Does contain some overhead with other subjects such as security and coding and has quite a heavy focus on protocols and internal networking (switched and routers).

Elvis10 February 2020

Great pace and very well taught. Must have basic network knowledge first before you can enjoy this course.

Enrico10 February 2020

I already take a Course for the CCNA from David Bombal,...and they are very well explained and easy to understand. This (Wireshark) Course is it the very same level! Enjoying this a lot!!! But I recommend to have some knowledge about Networking etc...to know better of whats going on. With Networking experience this Course also shows examples here and there...so the circle closes at the end of what you had difficulties with in CCNA...why and how. Can only recommend!!

Tyler3 February 2020

Exaclty the course I was looking for in learning how to use wireshark. There's a great section where he provides you pcap files as quizes that you have to go through and troubleshoot the network. As well as even how to use python and wireshark. Great course for someone new to networking that wants to learn wireshark in a practical way.

Thuvarakan5 January 2020

David has got lots of industrial experience. he goes systematically into the subject. I will recommend anyone who likes to learn Wireshark basics.

Testi1 January 2020

Another awesome course from David, synchronizing flow on Wireshark and Kali explained in clear and precise manner. would benefit curious network engineer and aspiring pentester alike, Recommended highly.

Charles31 December 2019

First time ever, I understand why the hell I need to learn OSI model, and the instructor evens give me the rythme to remember it man....

Matt5 December 2019

I like it alot. I found the same course at another website but it was way to expensive and no activity on the site. so i am switching to udemy for good:)

Nebras5 December 2019

I always want to know what is going behind the scene. wire shark reveals this secrets. David is the best teacher who explained Wire shark.

Aleksander28 November 2019

The course is more like a peek into the content of CCNA rather than ethical hacking and Wireshark analysis.

Bert20 November 2019

great so far, all steps are done and explained so its good to understand even if you are starting from step 0


4/7/202035% OFFExpired
10/12/2020100% OFFExpired
11/26/2020100% OFFExpired
12/19/2020100% OFFExpired
12/21/2020100% OFFExpired
12/31/2020100% OFFExpired
2/11/2021100% OFFExpired
3/17/2021100% OFFExpired
4/14/2021100% OFFExpired
6/23/2021100% OFFExpired


Udemy ID


Course created date


Course Indexed date
Course Submitted by