برای ثبت درخواست به انتهای صفحه مراجعه کنید.

Learning by Practicing - Mastering TShark Network Forensics

Moving From Zero to Hero

Description:... The book you have been waiting for to make you a Master of TShark Network Forensics, is finally here!!! Be it you are a Network Engineer, a Network Forensics Analyst, someone new to packet analysis or someone who occasionally looks at packet, this book is guaranteed to improve your TShark skills, while moving you from Zero to Hero.

Mastering TShark Network Forensics, can be considered the definitive repository of practical TShark knowledge. It is your one-stop shop for all you need to master TShark, with adequate references to allow you to go deeper on peripheral topics if you so choose.

Book Objectives:

  1. Introduce packet capturing architecture
  2. Teach the basics of TShark
  3. Teach some not so basic TShark tricks
  4. Solve real world challenges with TShark
  5. Identify services hiding behind other protocols
  6. Perform "hands-free" packet capture with TShark
  7. Analyze and decrypt TLS encrypted traffic
  8. Analyze and decrypt WPA2 Personal Traffic
  9. Going way beyond - Leveraging TShark and Python for IP threat intelligence
  10. Introduce Lua scripts
  11. Introduce packet editing
  12. Introduce packet merging
  13. Introduce packet rewriting
  14. Introduce remote packet capturing

Who is this book for?While this book is written specifically for Network Forensics Analysts, it is equally beneficial to anyone who supports the network infrastructure. This means, Network Administrators, Security Specialists, Network Engineers, etc., will all benefit from this book.
Considering the preceding, I believe the following represents the right audience for this book:
  • Individuals starting off their Cybersecurity careers
  • Individuals working in a Cyber/Security Operations Center (C/SOC)
  • General practitioners of Cybersecurity
  • Experienced Cybersecurity Ninjas who may be looking for a trick or two
  • Anyone who just wishes to learn more about TShark and its uses in network forensics
  • Anyone involved in network forensics
  • More importantly, anyhow who is looking for a good read

Not sure if this book is for you? Take a glimpse at the sample chapter before committing to it. Mastering TShark sample chapters can be found at: https: //bit.ly/TShark

All PCAPS used within this book can be found at: https: //github.com/SecurityNik/SUWtHEh-
As an addition to this book, the tool, pktIntel: Tool used to perform threat intelligence against packet data can be found at:
https: //github.com/SecurityNik/pktIntel

Show description

* ایمیل (آدرس Email را با دقت وارد کنید)
لینک پیگیری درخواست ایمیل می شود.
شماره تماس (ارسال لینک پیگیری از طریق SMS)
نمونه: 09123456789

در صورت نیاز توضیحات تکمیلی درخواست خود را وارد کنید

* تصویر امنیتی
 

به شما اطمینان می دهیم در کمتر از 8 ساعت به درخواست شما پاسخ خواهیم داد.

* نتیجه بررسی از طریق ایمیل ارسال خواهد شد

ضمانت بازگشت وجه بدون شرط
اعتماد سازی
انتقال وجه کارت به کارت
X

پرداخت وجه کارت به کارت

شماره کارت : 6104337650971516
شماره حساب : 8228146163
شناسه شبا (انتقال پایا) : IR410120020000008228146163
بانک ملت به نام مهدی تاج دینی

پس از پرداخت به صورت کارت به کارت، 4 رقم آخر شماره کارت خود را برای ما ارسال کنید.
X