
Network Forensics with Wireshark: Build Practical Expertise in Network Monitoring, Threat Detection, and Cyber Forensics with Wireshark (English Edition)
Author(s): Bhavik Shah (Author)
- Publisher finelybook 出版社: Orange Education Pvt Ltd
- Publication Date 出版日期: November 25, 2025
- Edition 版本: Build Practical Expertise in Network Monitoring, Threat Detection, and Cyber Forensics with Wireshark (English Edition)
- Language 语言: English
- Print length 页数: 172 pages
- ISBN-10: 9349888459
- ISBN-13: 9789349888456
Book Description
Demystifying Network Traces with Wireshark.
Book Description
In today’s digital world, Wireshark stands as the most powerful tool for uncovering what truly happens on a network. Network Forensics with Wiresharkwill take you through a structured, hands-on journey — from grasping the basics of TCP/IP communication to advanced forensic analysis. Beginning with how data flows across networks, readers will learn to capture and interpret packets, identify anomalies, and analyze encrypted traffic through SSL/TLS decryption. As the book progresses, it dives into detecting malware behavior, tracing covert channel attacks, and understanding how attackers exploit vulnerabilities across evolving network architectures. Each concept is reinforced with practical exercises and real-world case studies, helping readers apply theory to investigation.
1. Overview of TCP/IP Model
2. Flow of Internet Traffic
3. SSL and Certificate Chaining
4. Evolving Network Architecture
5. Introduction to Wireshark
6. Tools to Analyze Wireshark Traffic
7. Malware Analysis on Wireshark
Index
In today’s digital world, Wireshark stands as the most powerful tool for uncovering what truly happens on a network. Network Forensics with Wiresharkwill take you through a structured, hands-on journey — from grasping the basics of TCP/IP communication to advanced forensic analysis. Beginning with how data flows across networks, readers will learn to capture and interpret packets, identify anomalies, and analyze encrypted traffic through SSL/TLS decryption. As the book progresses, it dives into detecting malware behavior, tracing covert channel attacks, and understanding how attackers exploit vulnerabilities across evolving network architectures. Each concept is reinforced with practical exercises and real-world case studies, helping readers apply theory to investigation.
So, whether you are a student, network engineer, or cybersecurity professional, this book empowers you to analyze smarter, respond faster, and transform data into actionable security insight.
Table of Contents1. Overview of TCP/IP Model
2. Flow of Internet Traffic
3. SSL and Certificate Chaining
4. Evolving Network Architecture
5. Introduction to Wireshark
6. Tools to Analyze Wireshark Traffic
7. Malware Analysis on Wireshark
Index
下载地址
EPUB, PDF(conv) | 50 MB | 2025-12-06
finelybook
