Introduction to Wireshark for TCP/IP Networking

$1,250.00

Location: On-Site or Online
Pricing: $1,250 per seat (6-seat minimum)
Length: 3 Days

Course Summary

Introduction to Wireshark for TCP/IP Networking is a practical, hands-on course designed to teach students how to analyze, understand, and troubleshoot TCP/IP networks using Wireshark.

Students learn how network traffic actually behaves on the wireβ€”far beyond diagrams and theory. The course focuses on packet capture techniques, protocol dissection, TCP/IP fundamentals, and real-world troubleshooting scenarios involving latency, packet loss, retransmissions, and misconfigurations.

By the end of the course, students are comfortable capturing traffic, filtering packets, interpreting protocol behavior, and using Wireshark as a core diagnostic tool for networking, security, and application support.

Course Outline

Day 1 – Networking Foundations and Wireshark Basics

  • πŸ’¬ Lecture: Why packet analysis matters

  • πŸ’¬ Lecture: Review of TCP/IP model and protocol layering

  • πŸ’¬ Lecture: Frames, packets, segments, and encapsulation

  • πŸ’¬ Lecture: Where Wireshark fits in troubleshooting workflows

  • βš™οΈ Lab: Installing Wireshark and validating the environment

  • βš™οΈ Lab: Exploring the Wireshark interface and packet list panes

  • βš™οΈ Lab: Capturing traffic on a live interface

  • βš™οΈ Lab: Identifying Ethernet, IP, TCP, and UDP headers

  • βš™οΈ Lab: Saving and reopening packet capture files

Day 2 – Packet Capture and Filtering Mastery

  • πŸ’¬ Lecture: Capture vs display filters

  • πŸ’¬ Lecture: Berkeley Packet Filter (BPF) fundamentals

  • πŸ’¬ Lecture: Display filter syntax and logic

  • βš™οΈ Lab: Applying capture filters to limit traffic

  • βš™οΈ Lab: Building display filters for common protocols

  • βš™οΈ Lab: Filtering by IP address, port, and protocol

  • βš™οΈ Lab: Combining filters with AND / OR logic

  • πŸ’¬ Lecture: Time, packets, and conversations

  • βš™οΈ Lab: Using time display formats

  • βš™οΈ Lab: Following TCP and UDP streams

  • βš™οΈ Lab: Viewing conversations and endpoints statistics

Day 3 – TCP, UDP, and Core Protocol Analysis

  • πŸ’¬ Lecture: TCP connection lifecycle (3-way handshake, teardown)

  • πŸ’¬ Lecture: Sequence numbers, acknowledgements, and windowing

  • πŸ’¬ Lecture: Retransmissions, latency, and congestion indicators

  • βš™οΈ Lab: Analyzing a TCP three-way handshake

  • βš™οΈ Lab: Identifying retransmissions and duplicate ACKs

  • βš™οΈ Lab: Measuring round-trip time (RTT)

  • βš™οΈ Lab: Detecting slow connections and packet loss

  • πŸ’¬ Lecture: UDP behavior and use cases

  • πŸ’¬ Lecture: Common TCP/IP application protocols (DNS, HTTP)

  • βš™οΈ Lab: Analyzing DNS queries and responses

  • βš™οΈ Lab: Tracing HTTP request and response flows

  • βš™οΈ Lab: Differentiating TCP vs UDP traffic patterns

Day 4 – Real-World Troubleshooting and Analysis Techniques

  • πŸ’¬ Lecture: Structured troubleshooting with packet captures

  • πŸ’¬ Lecture: Identifying client vs server responsibility

  • πŸ’¬ Lecture: Common network failure patterns

  • βš™οΈ Lab: Troubleshooting a slow application scenario

  • βš™οΈ Lab: Diagnosing a failed TCP connection

  • βš™οΈ Lab: Identifying MTU and fragmentation issues

  • βš™οΈ Lab: Detecting malformed or unexpected packets

  • πŸ’¬ Lecture: Best practices for packet captures in production

  • πŸ’¬ Lecture: Interpreting results and communicating findings

  • βš™οΈ Lab: Building a repeatable capture and analysis workflow

  • βš™οΈ Lab: Documenting findings from packet analysis

  • βš™οΈ Lab: Walking through an end-to-end TCP/IP troubleshooting exercise

Outcomes

Students who complete Introduction to Wireshark for TCP/IP Networking will be able to:

  • Capture and analyze network traffic confidently

  • Understand TCP/IP behavior at the packet level

  • Use filters to isolate relevant traffic quickly

  • Identify latency, packet loss, and retransmission issues

  • Troubleshoot real-world network and application problems

  • Communicate findings clearly using packet evidence

Location: On-Site or Online
Pricing: $1,250 per seat (6-seat minimum)
Length: 3 Days

Course Summary

Introduction to Wireshark for TCP/IP Networking is a practical, hands-on course designed to teach students how to analyze, understand, and troubleshoot TCP/IP networks using Wireshark.

Students learn how network traffic actually behaves on the wireβ€”far beyond diagrams and theory. The course focuses on packet capture techniques, protocol dissection, TCP/IP fundamentals, and real-world troubleshooting scenarios involving latency, packet loss, retransmissions, and misconfigurations.

By the end of the course, students are comfortable capturing traffic, filtering packets, interpreting protocol behavior, and using Wireshark as a core diagnostic tool for networking, security, and application support.

Course Outline

Day 1 – Networking Foundations and Wireshark Basics

  • πŸ’¬ Lecture: Why packet analysis matters

  • πŸ’¬ Lecture: Review of TCP/IP model and protocol layering

  • πŸ’¬ Lecture: Frames, packets, segments, and encapsulation

  • πŸ’¬ Lecture: Where Wireshark fits in troubleshooting workflows

  • βš™οΈ Lab: Installing Wireshark and validating the environment

  • βš™οΈ Lab: Exploring the Wireshark interface and packet list panes

  • βš™οΈ Lab: Capturing traffic on a live interface

  • βš™οΈ Lab: Identifying Ethernet, IP, TCP, and UDP headers

  • βš™οΈ Lab: Saving and reopening packet capture files

Day 2 – Packet Capture and Filtering Mastery

  • πŸ’¬ Lecture: Capture vs display filters

  • πŸ’¬ Lecture: Berkeley Packet Filter (BPF) fundamentals

  • πŸ’¬ Lecture: Display filter syntax and logic

  • βš™οΈ Lab: Applying capture filters to limit traffic

  • βš™οΈ Lab: Building display filters for common protocols

  • βš™οΈ Lab: Filtering by IP address, port, and protocol

  • βš™οΈ Lab: Combining filters with AND / OR logic

  • πŸ’¬ Lecture: Time, packets, and conversations

  • βš™οΈ Lab: Using time display formats

  • βš™οΈ Lab: Following TCP and UDP streams

  • βš™οΈ Lab: Viewing conversations and endpoints statistics

Day 3 – TCP, UDP, and Core Protocol Analysis

  • πŸ’¬ Lecture: TCP connection lifecycle (3-way handshake, teardown)

  • πŸ’¬ Lecture: Sequence numbers, acknowledgements, and windowing

  • πŸ’¬ Lecture: Retransmissions, latency, and congestion indicators

  • βš™οΈ Lab: Analyzing a TCP three-way handshake

  • βš™οΈ Lab: Identifying retransmissions and duplicate ACKs

  • βš™οΈ Lab: Measuring round-trip time (RTT)

  • βš™οΈ Lab: Detecting slow connections and packet loss

  • πŸ’¬ Lecture: UDP behavior and use cases

  • πŸ’¬ Lecture: Common TCP/IP application protocols (DNS, HTTP)

  • βš™οΈ Lab: Analyzing DNS queries and responses

  • βš™οΈ Lab: Tracing HTTP request and response flows

  • βš™οΈ Lab: Differentiating TCP vs UDP traffic patterns

Day 4 – Real-World Troubleshooting and Analysis Techniques

  • πŸ’¬ Lecture: Structured troubleshooting with packet captures

  • πŸ’¬ Lecture: Identifying client vs server responsibility

  • πŸ’¬ Lecture: Common network failure patterns

  • βš™οΈ Lab: Troubleshooting a slow application scenario

  • βš™οΈ Lab: Diagnosing a failed TCP connection

  • βš™οΈ Lab: Identifying MTU and fragmentation issues

  • βš™οΈ Lab: Detecting malformed or unexpected packets

  • πŸ’¬ Lecture: Best practices for packet captures in production

  • πŸ’¬ Lecture: Interpreting results and communicating findings

  • βš™οΈ Lab: Building a repeatable capture and analysis workflow

  • βš™οΈ Lab: Documenting findings from packet analysis

  • βš™οΈ Lab: Walking through an end-to-end TCP/IP troubleshooting exercise

Outcomes

Students who complete Introduction to Wireshark for TCP/IP Networking will be able to:

  • Capture and analyze network traffic confidently

  • Understand TCP/IP behavior at the packet level

  • Use filters to isolate relevant traffic quickly

  • Identify latency, packet loss, and retransmission issues

  • Troubleshoot real-world network and application problems

  • Communicate findings clearly using packet evidence