Wouldn’t you like to know what is going on with your network? From the moment you turn on your PC, a lot of voluntary and transparent connections are launched and we do not know where they are headed to: to our network, the internet… Which and how many protocols are travelling through our network? Are they secure? Can we hack them? What images are the users downloading? These are some of the questions that this course will be answering by using Wireshark v2. The course trains the student in order to acquire the ability to capture and analyze packets which travel within the net, to interprete the results and it also makes suggestions on how to opperate with the data we get. Polished training: Evolution and evaluation checkoints. This course follows an evolution from the scratch to a beginner level. The training process is detailed with step by step guidelines, diagrams, comment, etc. The student’s knowledge will be reinforced by intros and summaries at the beginning and end of every chapter, and even questionnaires at the end of every module, which serve as termometers of their progress. Besides, in order to honour our brand’s name (Network Thinker) we will force you to think: we will present to you a laboratory environment where we have been carrying out our concept tests (PoC). You will have access to the previously captured traffic files so that you can download and analyze them on your own. With them, we will set a series of challenges that will be talked out some minutes later. This way, you will resort to your own wit and practice the skills learned during the course. Allow you to reason on your own will get you to complete the different levels in the course all by yourself. Level of content: From scratch to beginner. To prevent the student from being a tad lost when reaching the end of the course, we will start with the very basics and learn some network basic notions, installing and downloading the software. It will carry on by diving a bit more deeply into the Graphic interface GUI, since Wireshark v2 offers new protocols and posibilities, getting to know the new menus and beginning to adjust things for the first time. When finally capturing traffic, we will soon feel the need to understand what is it that we need to take and export and also, how can we do it in different formats, how to create reports in a more or less detailed fashion, etc. We will also learn how to interprete the data shown in the statistics. Afterwards, we will pay special attention to the different kinds of filters available, whether they are active or not by default, how they are to be used, sintax, and so on. This way we can know where and what to filter, pick out the meaningful information from the capture filter and ignore it when necessary. We will see how to program the closure of the capture either by space or time, to make use of the default filters and even to create our own. At the end of this course, the student will have acquired the necessary skills to use Wireshark. This freeware protocol analyzer is commonly used and praised in the communications field, among engineers, network administrators, users… Save training time! Who is the course intended for?-IT students who want to find out what a sniffer is and its know-how. -Both beginners and advanced computer users who seek to gain confidence and to know what happens within their networks.-Network admins and security professionals who require a deeper knowledge to analyze their networks and make them more secure. -People interested in hacking who do not know where to begin.