Network Traffic Analysis with Wireshark

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Network Traffic Analysis with Wireshark

Coursera · Intermediate ·🔐 Cybersecurity ·1mo ago
This course provides hands-on training in network traffic analysis using Wireshark for cybersecurity professionals. You’ll learn to capture, analyze, and interpret network traffic to detect security threats and investigate incidents. Through practical exercises, you’ll gain experience with packet sniffing, protocol analysis, and traffic flow monitoring while working with real-world network data. The curriculum covers essential techniques including Deep Packet Inspection (DPI), traffic filtering, and anomaly detection. You’ll practice identifying malicious patterns like DDoS attacks, port scanning, and data exfiltration attempts. Case studies simulate actual security incidents, teaching you to correlate evidence and trace attack vectors through network traffic. A key focus is developing actionable reporting skills for incident response teams. You’ll learn to document findings, create visualizations of network activity, and present technical details to both security teams and non-technical stakeholders. The course culminates in a capstone project where you analyze a complex traffic capture and produce a professional security assessment report. Designed for aspiring cybersecurity analysts, network administrators, and IT professionals, this training bridges the gap between theoretical knowledge and practical traffic analysis skills. You’ll finish with hands-on experience using industry-standard tools and techniques that are immediately applicable in security operations centers and forensic investigations.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Metamorphic Malware in 2026: Why Your EDR Is Already Losing the Arms Race
Metamorphic malware is outsmarting traditional EDR systems, requiring new approaches to cybersecurity
Medium · AI
Metamorphic Malware in 2026: Why Your EDR Is Already Losing the Arms Race
Metamorphic malware is evolving to evade detection, making traditional EDR solutions ineffective, and requiring new approaches to cybersecurity
Medium · Cybersecurity
Recruit TryHackMe walkthrough
Learn to solve the Recruit TryHackMe challenge by applying SQL Injection, Local File Inclusion, and web enumeration techniques
Medium · Cybersecurity
Five Attacks in One Month: The Fake Recruiter Campaign Targeting Blockchain Developers
Learn about the fake recruiter campaign targeting blockchain developers and how to protect yourself from similar attacks
Medium · JavaScript
Up next
HOW CISA leaked public passwords
David Bombal
Watch →