By Mohamad Mahjoub, CISO

Master Wireshark 3 in 5 Days

Language: English
All Levels

Course description


Wireshark is the world’s foremost network protocol analyzer. It lets you see what’s happening on your network at a microscopic level. It is the de facto standard across many industries and educational institutions. This course will be your go-to guide through the latest release of Wireshark, showing you exactly what you need to do, and do it well, by explaining the fundamental network terminologies, using Wireshark for network analysis, and running through its myriad features. We will begin with a quick introduction to Wireshark and how it is used to capture and analyze your protocol packets. We will then work with the various TCP/IP layers and learn some important network communication techniques. Moving on, we’ll create and work with several Wireshark Filters. You will gain the skills to capture data using the various network protocol techniques, alongside analyzing and troubleshooting your network. By the end of the course, you will be confident to utilize Wireshark for your network analysis tasks effectively on a day-to-day basis.


• Network administrators • System administrators • Developers • Security analysts • Ethical hackers • Students • High-level understanding of networking technologies • No prior knowledge of Wireshark is required


There is so much to learn in this course: • Capture and analyze HTTP, FTP, DNS, DHCP, ARP, SMTP, and ICMP traffic • Analyze and troubleshoot network problems before they cause any harm to your network • Deep packet inspection and analysis for famous protocols


• Troubleshoot and secure your network with Wireshark • Capture common communication protocols with Wireshark • Understand and interpret network protocols • Learn how to leverage Wireshark to perform ethical hacking


Mohamad Mahjoub is a prolific writer and a Cyber Security Expert with over 15 years’ experience which includes more than 5 years of experience working with Wireshark. He is a licensed and certified CISSP, ISO Risk Manager, CISA, PMP, and ITIL. He obtained his Master’s Degree in Computer Science from the Lebanese American University, where he graduated with magna cum laude. Mohamad’s accomplishments and research acumen are driving forces rooted in his professionalism. He is trained and certified to offer first-hand professional cyber security services to individuals and companies. Since 2012, Mohamad has delivered many IT courses to fresh graduates, IT professionals, senior and executive management, and business owners, all on top of his online multilingual cyber security courses that have more than 30,000 students enrolled worldwide. Currently, Mohamad works as CISO for a French multinational company, where he is responsible for the security of IT and OT operations throughout the Middle East area.


• DAY ONE - We will introduce Wireshark and setup our environment • DAY TWO - We will explore Wireshark interface in details • DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters • DAY FOUR  - Inspect packets for common network and transport layers protocols • DAY FIVE  - Learn how to capture application layer protocol packets and perform deep packet inspection,  along with detecting network issues


DAY ONE – Introduction 
 • Video 1: Overview • Video 2: Wireshark throughout history • Video 3: Setup Wireshark

DAY TWO - The Interface in Details
 • Video 1: File menu • Video 2: Export packets • Video 3: Edit menu • Video 4: View menu • Video 5: Toolbars • Video 6: Statistics menu • Video 7: Configure global preferences • Video 8: Configuration profiles

DAY THREE – Features You Should Know

• Video 1: How is traffic captured • Video 2: SPAN ports • Video 3: Capture options • Video 4: Capture filters • Video 5: Display filters • Video 6: Finding and marking packets • Video 7: Expressions and buttons

DAY FOUR – Communication Protocols • Video 1: 3-way handshake • Video 2: TCP deep-dive • Video 3: UDP deep-dive • Video 4: IPv4 deep-dive • Video 5: IPv6 deep-dive • Video 6: ICMPv4 deep-dive • Video 7: ICMPv6 deep-dive DAY FIVE - Analyze Common Protocols • Video 1: HTTP analysis • Video 2: FTP analysis • Video 3: DNS analysis • Video 4: DHCP analysis • Video 5: SMTP analysis • Video 6: ARP analysis • Video 7: Troubleshoot your network


Minimum Requirements • OS: Windows 10 Operating System • Processor: Core i5 (or equivalent) • Memory: 4GB RAM • Storage: 256 GB • Browser: Firefox, Chrome, or Edge Chromium,  the latest version • Latest version of Wireshark  (

Course overview - 5






Meet your instructor

Hi! I’m Mohamad; you might call me a bit of a computer geek; just a bit. After spending 5 years working as an IT Project Manager for a leading multinational pharmaceutical company, I moved to the Banking sector to attain a senior role in the Information Security Audit field for 4 years; it was such a great experience. I have then relocated to Dubai to join a Dubai Smart Government entity for 3 years as an Information Security Manager. Currently I’m working as an Information Security Consultant for different companies in Dubai, Oman, and Bahrain. I have a total of 15 years of experience in the Information Technology field, with a focus on Information Security. Since 2012, I have delivered many IT courses and topics to technical and non-technical audience, varying from fresh graduates, IT professionals, senior and executive management, and business owners. In a world of ubiquitous technology, I believe that Information Security is more important than ever, and it is something that everyone should be aware of, therefore it should not only be exclusive to the privileged few. I’m passionate about making this happen through spreading my knowledge to people like you. I’m a certified CISSP, CISA, PMP, ITIL, and ISO 27005 Risk Manager and I have a Masters in Computer Science from the Lebanese American University (LAU). I hope you will enjoy my course.