VTC (Virtual Training Company) - TCP/IP (Transmission Control Protocol/Internet Protocol) Packet Analysis Both network administrators and IT security professionals must have the fundamental knowledge of TCP/IP to do their jobs. With that comes a necessity to be able to analyze TCP/IP traffic in order to troubleshoot network problems, analyze attacks, and better understand and secure their systems. Veteran VTC author, Bobby Rogers, will provide in-depth explanations for beginners and seasoned network professionals alike to enable them to understand the complex techniques of TCP/IP traffic analysis.
VTC - TCP/IP Packet Analysis Tutorials 2008 (Eng)
Overview:
Introduction
Introduction & Course Outline (04:03)
TCP/IP Concepts
The OSI Model (06:40)
The TCP/IP Protocol (05:13)
TCP/IP Protocols & Model (03:07)
How Network Communication Really Works (03:18)
Basics of TCP & UDP Protocols
Introduction to TCP & UDP Protocols (04:30)
TCP & UDP Ports (07:10)
TCP Sequence Numbers (02:16)
Windowing (02:22)
TCP Flags (02:27)
TCP 3-Way Handshake (02:21)
Demonstration: TCP Session (04:50)
TCP & UDP Packet Construction
Common Packet Construction (04:34)
Taking Apart a TCP Packet (03:54)
Demonstration - Taking Apart a TCP Packet (05:12)
Examining a UDP Datagram (02:33)
Demonstration - Examining a UDP Datagram (04:22)
Basics of IP Protocols
IP Protocols (04:23)
Breakdown of an IP Packet (04:00)
Demonstration: An IP Packet Header (04:01)
ICMP (07:03)
ARP (04:26)
Packet Analysis Tools
Wireshark (07:50)
Tcpdump & WinDump (02:44)
ColaSoft Packet Builder (06:10)
Hping2 (05:48)
Scanning Tools (05:24)
Packet Capturing
Packet Capturing with Wireshark pt. 1 (04:31)
Packet Capturing with Wireshark pt. 2 (04:02)
Recording & Using Packet Captures (06:37)
Sniffing Switched vs. Non-Switched Traffic (05:44)
Analyzing TCP/IP Traffic
Establishing Pattern & Timeline (04:55)
Getting the Entire Session (04:11)
Knowing What to Look For pt. 1 (02:13)
Knowing What to Look For pt. 2 (06:23)
Analyzing a Simple Traffic Capture (05:44)
Analyzing Common Protocols
FTP (06:47)
Telnet (05:27)
HTTP (05:54)
HTTPS (06:26)
SMB & NetBIOS (04:46)
Looking for Malicious Traffic
What Malicious Traffic Looks Like pt. 1 (05:06)
What Malicious Traffic Looks Like pt. 2 (04:34)
Excessive/Oversized/Fragmented Packets (03:24)
TCP Flags (05:31)
ICMP Attacks (06:27)
Spoofed Traffic (05:27)
Examining Wireless Traffic
Capturing Wireless Traffic pt. 1 (05:43)
Capturing Wireless Traffic pt. 2 (05:01)
Taking Apart a Wireless Session (07:12)
Examining Wireless Traffic - WEP (04:05)
Examining Wireless Traffic - WPA (04:54)
Practical Applications of Traffic Analysis
Network Troubleshooting pt. 1 (04:15)
Network Troubleshooting pt. 2 (05:58)
Intrusion Detection (06:39)
Network Forensics (05:33)
Defeating Traffic Analysis pt. 1 (04:27)
Defeating Traffic Analysis pt. 2 (04:31)
Download
Mirror Rapidshare links
LINKS ARE INTERCHANGEABLE.
IT MEANS YOU CAN DOWNLOAD ANY PART FROM ANY SERVER AND LATER EXTRACT IT. NO PROBLEM AT ALL.
No comments:
Post a Comment