757-216-3656 | Monday–Friday 8:30 AM – 4:30 PM | info@itdojo.com

Course Duration

5 Days

Audience

Employees of federal, state and local governments; and businesses working with the government.

Prerequisites

Comfort with the Linux command line Foundational knowledge of TCP/IP networking Basic familiarity with the OSI model

Course Description

This hands-on, lab-driven course takes you from foundational packet capture to advanced wireless network forensics using Wireshark and a powerful ecosystem of companion tools. Through 30+ guided exercises performed on real hardware, students build practical skills in traffic analysis, 802.11 wireless security, credential discovery, attack pattern recognition, and custom tooling — skills that translate directly to real-world network defense and investigation work. Every concept is reinforced with immediate, practical application. Students work with live wireless traffic, real router hardware, and industry-standard tools in a purpose-built lab environment — not simulations.

Learning Objectives

  • Capture, filter, and analyze both wired and wireless network traffic with precision
  • Operate wireless interfaces in monitor mode for full-spectrum 802.11 frame capture
  • Recognize attack signatures and anomalous traffic patterns in live and recorded captures
  • Extract actionable intelligence from complex, multi-source capture files
  • Map wireless network architectures and device relationships from traffic alone
  • Build custom analysis workflows using Python, Scapy, and command-line capture tools
  • Perform remote, distributed packet capture across networked systems
  • Deploy analysis environments using modern containerization techniques
  • Assess the security of captured authentication exchanges and wireless handshakes

Course Outline

Module 1 — Environment & Foundations
Module 2 — Wireshark Configuration & Profiles
Module 3 — Capture & Display Filtering
Module 4 — Wireless Mode Operations
Module 5 — Traffic Visualization & Geolocation
Module 6 — Packet Analysis & Pattern Recognition
Module 7 — Wireless Architecture Discovery
Module 8 — Credential & Authentication Analysis
Module 9 — Command-Line Capture Tools
Module 10 — Custom Tooling with Python & Scapy
Module 11 — Remote & Distributed Capture
Module 12 — Containerized Deployments
Module 13 — Wireless Security Assessment
Get More Information

We cannot work with the general public. We only work with Government Agencies, Military, government contractors, and corporate clients.