 Hello, my name is DJ Stavens, I'm a Microsoft MVP and I'm a SENSE Internet Storm Center handler and I teach this Wireshark class. When I started to use Wireshark, it was still called Adreel, so that's quite some time ago. And along the way, I became certified. I'm a Wireshark Certified Network Analyst. Now did you know that Wireshark is the number one security tool as voted in a survey by SecTools.org? Let's take a look at this class. My Wireshark training is a two-day training. So first we will get familiar with Wireshark, I will explain all the different menu options. We will also learn how to use the RP-CAP adapter for WIFI snipping. Now this adapter is something that you need on Windows. On Linux and OS X machines, you don't need a special adapter to be able to do WIFI snipping, but on Windows you do. And this is the RP-CAP adapter, it's a USB device and this is included in the price of the training. We will also look at normal and abnormal network traffic, so normal traffic like DNS, SSH, HTTP, FTP, all those kinds of traffic and then abnormal traffic that is something like a port scan traffic from a meter preter from a malicious download, things like that. And then a large part of the training will also be scripting. So we will use the Lua programming language to script dice sectors. A big part will be scripting a dice sector for a botnet protocol that I designed. And another dice sector that we will learn to use is a TCP Flags dice sector. So this dice sector allows you to have, like you can see here, the TCP Flags as you can see them in TCP dump. So with here, ak, ak, ak, fin, cin, things like that. And you cannot have this by default in Wireshark, but you can write a dice sector to have this information and that's what we are going to do here. This is an example of this dice sector. So we define a post dice sector for TCP Flags. We define a new field, TCP Flags.Flags, that will be the asterix and the letters. And then we will read the TCP.Flags field and transform this here to build up our string with an asterix or else c, e, u, a, p, r, s, f for the different Flags you can have in the TCP Flag. This training is very handsome. I prepared a lot of exercises for you. So if you are interested, please visit the website and register.