When you enroll in this course, you'll also be enrolled in this Professional Certificate.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate from SkillUp
There are 5 modules in this course
This course provides hands-on training in network traffic analysis using Wireshark for cybersecurity professionals. You’ll learn to capture, analyze, and interpret network traffic to detect security threats and investigate incidents. Through practical exercises, you’ll gain experience with packet sniffing, protocol analysis, and traffic flow monitoring while working with real-world network data.
The curriculum covers essential techniques including Deep Packet Inspection (DPI), traffic filtering, and anomaly detection. You’ll practice identifying malicious patterns like DDoS attacks, port scanning, and data exfiltration attempts. Case studies simulate actual security incidents, teaching you to correlate evidence and trace attack vectors through network traffic.
A key focus is developing actionable reporting skills for incident response teams. You’ll learn to document findings, create visualizations of network activity, and present technical details to both security teams and non-technical stakeholders. The course culminates in a capstone project where you analyze a complex traffic capture and produce a professional security assessment report.
Designed for aspiring cybersecurity analysts, network administrators, and IT professionals, this training bridges the gap between theoretical knowledge and practical traffic analysis skills. You’ll finish with hands-on experience using industry-standard tools and techniques that are immediately applicable in security operations centers and forensic investigations.
This module introduces you to the world of network forensics and traffic analysis. You'll explore the principles, tools, and ethical considerations involved in capturing and analyzing network traffic. Through real-world case studies and readings, you'll learn to differentiate between traffic analysis and forensic investigation. By the end of this module, you'll understand the foundations of network-based investigations, privacy concerns, and the role of traffic visualization in detecting threats.
What's included
5 videos2 readings3 assignments10 plugins
Show info about module content
5 videos•Total 30 minutes
Course Introduction•3 minutes
Introduction to Network Forensics•6 minutes
Common Challenges in Network Forensics•6 minutes
Network Traffic Analysis•9 minutes
Visualizing Traffic Patterns•8 minutes
2 readings•Total 13 minutes
Course Overview•3 minutes
Summary and Highlights: Network Forensics and Network Traffic Analysis•10 minutes
3 assignments•Total 41 minutes
Practice Quiz: Network Forensics•10 minutes
Practice Quiz: Network Traffic Analysis•10 minutes
Graded Quiz: Network Forensics and Network Traffic Analysis•21 minutes
10 plugins•Total 43 minutes
Reading: How to Make the Most of This Course•6 minutes
Reading: Timeline: The Evolution of Network Forensics•7 minutes
Reading: Cybersecurity and Ethical Hacking Applications of Network Forensics•5 minutes
Reading: Case Study: Network Forensics•3 minutes
Reading: Ethical and Legal Considerations of Network Forensics•3 minutes
Reading: Network Traffic Analysis vs. Network Forensics•2 minutes
Podcast: Network Traffic Analysis vs. Network Forensics•6 minutes
Reading: Case Study: Network Traffic Analysis•5 minutes
Reading: Ethical and Legal Considerations of Network Traffic Analysis•3 minutes
Glossary: Network Forensics and Network Traffic Analysis•3 minutes
Packet Capture and Filtering with Wireshark
Module 2•3 hours to complete
Module details
In this module, you will learn how to use Wireshark to capture and filter packets. You'll explore how to install, configure, and navigate Wireshark's interface, and practice using basic and advanced filters. Hands-on labs will guide you through real-world capture scenarios, while readings and videos explain the relevance of packet capture in ethical hacking and network monitoring. By the end of this module, you'll be able to capture traffic, apply filters, and analyze packet structures.
What's included
5 videos1 reading3 assignments11 plugins
Show info about module content
5 videos•Total 33 minutes
Introduction to Wireshark•5 minutes
Scanning with Wireshark•6 minutes
Basics of Packet Capture•8 minutes
Basics of Packet Filtering•7 minutes
Filtering Captured Traffic in Wireshark•7 minutes
1 reading•Total 2 minutes
Summary and Highlights: Packet Capture and Filtering with Wireshark•2 minutes
3 assignments•Total 41 minutes
Practice Quiz: Introduction to Wireshark•10 minutes
Practice Quiz: Packet Capture and Filtering•10 minutes
Graded Quiz: Packet Capture and Filtering with Wireshark•21 minutes
11 plugins•Total 74 minutes
Reading: Guide: Installing and Configuring Wireshark•6 minutes
Reading: Installing Kali Linux•7 minutes
Lab: Navigating the Wireshark Interface•15 minutes
Reading: Cybersecurity and Ethical Hacking Applications of Wireshark•2 minutes
Lab: Running an Initial Network Scan•15 minutes
Reading: Guide to Packet Headers•6 minutes
Reading: Creating and Troubleshooting Filter Configurations•7 minutes
Reading: Guide to Advanced Filtering Techniques in Wireshark•3 minutes
Lab: Apply Traffic Filters•8 minutes
Reading: Cybersecurity and Ethical Hacking Applications of Packet Capture•2 minutes
Glossary: Packet Capture and Filtering with Wireshark•3 minutes
DPI and Network Protocol Analysis
Module 3•2 hours to complete
Module details
This module focuses on Deep Packet Inspection (DPI) and network protocol analysis. You'll learn how to inspect packet payloads, analyze protocol behavior, and identify vulnerabilities. Hands-on labs and readings guide you through DPI and protocol analysis using Wireshark. By the end of this module, you will be able to recognize malware activity, misconfigurations, and common protocol weaknesses.
What's included
4 videos1 reading3 assignments8 plugins
Show info about module content
4 videos•Total 26 minutes
Basics of DPI•7 minutes
DPI and Advanced Payload Analysis•5 minutes
Basics of Wireshark Network Protocols•8 minutes
Detecting Vulnerabilities in Network Protocols•6 minutes
1 reading•Total 2 minutes
Summary and Highlights: DPI and Network Protocol Analysis•2 minutes
3 assignments•Total 41 minutes
Practice Quiz: Performing Deep Packet Inspection (DPI)•10 minutes
Practice Quiz: Network Protocol Analysis•10 minutes
Graded Quiz: DPI and Network Protocol Analysis•21 minutes
8 plugins•Total 76 minutes
Reading: Mapping DPI Results to Security Frameworks•4 minutes
Reading: Ethical Hacking Applications of DPI•3 minutes
Lab: Perform a Manual DPI Using Wireshark•20 minutes
Reading: Common Wireshark Protocols•8 minutes
Reading: Cybersecurity Applications of Network Protocol Analysis•3 minutes
Reading: Ethical Hacking Applications of Network Protocol Analysis•4 minutes
Lab: Analyze Network Protocols in Wireshark•30 minutes
Glossary: DPI and Network Protocol Analysis•4 minutes
Advanced Traffic Analysis and Reporting
Module 4•4 hours to complete
Module details
This module advances your skills by teaching flow data analysis, anomaly detection, and professional reporting. You'll learn how to use NetFlow-style data and Wireshark to identify security threats and then document your findings clearly for stakeholders. Ethical and legal considerations are emphasized throughout, and you'll complete a real-world traffic investigation activity.
Recognizing Security Threats in Network Traffic•6 minutes
Exporting Captured Data from Wireshark•5 minutes
Generating Comprehensive Reports•5 minutes
1 reading•Total 2 minutes
Summary and Highlights: Advanced Traffic Analysis and Reporting•2 minutes
3 assignments•Total 41 minutes
Practice Quiz: Flow Analysis and Security Threat Identification•10 minutes
Practice Quiz: Exporting and Reporting Traffic Analysis•10 minutes
Graded Quiz: Advanced Traffic Analysis and Reporting•21 minutes
2 app items•Total 120 minutes
Activity: Analyze Bandwidth Usage•60 minutes
Activity: Identify a Potential Breach•60 minutes
6 plugins•Total 27 minutes
Reading: Guide to Flow Data Analysis•4 minutes
Reading: Ethical Hacking and Cybersecurity Applications•5 minutes
Reading: Use Cases for Exporting and Reporting•7 minutes
Lab: Export Captured Data from Wireshark•4 minutes
Reading: Best Practices for Reporting Findings•3 minutes
Glossary: Advanced Traffic Analysis and Reporting•4 minutes
Final Project and Course Wrap-Up
Module 5•2 hours to complete
Module details
This practical module teaches learners to capture, filter, and analyze live network traffic using Wireshark. Participants will identify anomalies, identify unauthorized access attempts, and document findings. By the end, learners will apply traffic analysis techniques to enhance network security monitoring.
What's included
1 video2 readings1 assignment2 app items3 plugins
Show info about module content
1 video•Total 3 minutes
Course Wrap-Up •3 minutes
2 readings•Total 4 minutes
Congratulations and Next Steps•2 minutes
Team and Acknowledgments•2 minutes
1 assignment•Total 45 minutes
Final Exam•45 minutes
2 app items•Total 40 minutes
Final Project: Section 1: Submission and Evaluation•20 minutes
Final Project: Section 2: Submission and Evaluation•20 minutes
3 plugins•Total 38 minutes
Final Project Overview•5 minutes
Final Project: Section 1: Capturing, Analyzing, and Responding to Network Traffic•30 minutes
Final Project: Section 2: Capturing, Analyzing, and Responding to Network Traffic•3 minutes
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
In a world marked by relentless evolution, versatility, adaptability, and interdisciplinary skills are key to thriving professionally. At SkillUp, we focus on designing outcome-driven skill-development programs that transform lives and careers worldwide.
Whether it’s landing your first job, advancing in your career, mastering efficiency in your role, or making breakthroughs in diverse careers, our courses equip you with the skills and confidence to set you up to hit the ground running.
Combining sound instructional design, engaging multimedia, and real-world problem-solving, we create learning journeys that build knowledge step by step. We present learners with open-ended, real-world problems that help them apply acquired knowledge as they progress through their learning journey. This also allows learners to develop critical thinking, problem-solving, and collaborative skills.
Our courses, specializations, professional certificates, and virtual and blended learning programs help learners and organizations upskill on the world’s latest technologies, functional domains, and human skills.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Certificate?
When you enroll in the course, you get access to all of the courses in the Certificate, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.