View Full Version : Question for people that have bitspyder/bitme access
bigtone
01-22-2008, 03:53 PM
Do either of these sites have wireshark university courses 1 through 3? I have 4 but I'd like to complete the set, if anyone could let me know I'd appreciate it.
Giveaway
01-22-2008, 03:59 PM
yes on bitme there is the whole torrent.
Wireshark University - Wireshark Network Forensics and Security
Wireshark University - Wireshark Network Forensics and Security - Courtesy Bitspyder
Self-Paced Course Materials
The self-paced course provides voice-over-video training sessions on DVD. Course materials
include lab instructions (PDF format), resources/references for network analysts (PDF format),
lab trace files (PCAP format) and general trace files for further study.
Course Content
This course focuses on network forensics including capture locations, stealth-mode capture,
optimal capture and display filters, validating encrypted logins, identifying reconnaissance
processes, locating header and payload signatures, catching penetration tests, malware
behavior, backdoor communications and virus traffic.
Section 1: Analyzer Placement
a) Analyzing Hubbed Networks
b) Analyzing Switched Networks
c) Analyzing Routed Networks
d) Analyzing WAN Links
e) Tapping into Full-Duplex Links
f) Capturing in Stealth Mode
g) Obtaining Evidence Using a Honeypot
Section 2: Unususal Network Communications
a) Vulnerabilities in the TCP/IP Resolution Process
b) Route Resolution
c) Spotting Unacceptable Traffic
Section 3: Reconnaissance Processes
a) Port Scans
b) Mutant Scans
c) IP Scans
d) Application Mapping
e) OS Fingerprinting
Section 4: Analyzing ICMP Traffic
a) ICMP Types and Codes
b) ICMP Discovery
c) Router Redirection
d) Dynamic Router Discovery
e) Service Refusal
f) OS Fingerprinting
Section 5: TCP Security
a) TCP Segment Splicing
b) TCP Fake Resets
Section 6: Address Spoofing
a) MAC Address Spoofing
b) IP Address Spoofing
Section 7: Building Firewall ACL Rules
a) Overview of ACL Rule Types
Section 8: Signatures of Attacks
a) Signature Locations
b) Header Signatures
c) Sequencing Signatures
d) Payload Signatures
e) Obtaining Signatures
f) Attacks and Exploits
g) Password Cracks
h) Denial of Service Attacks
i) Redirections
bigtone
01-22-2008, 04:14 PM
Giveaway, thanks for checking for me, I alread have WSU04 - Wireshark Network Forensics and Security.
I am looking for the previous 3 in the series
WSU01 - Wireshark Functionality and Fundamentals
(http://www.wiresharktraining.com/catalog.html)WSU02 - TCP/IP Network Analysis
(http://www.wiresharktraining.com/catalog.html)WSU03 - Troubleshooting Network Performance
Powered by vBulletin® Version 4.2.3 Copyright © 2025 vBulletin Solutions, Inc. All rights reserved.