seela logo

Ethical Hacker


Wireshark course - Analyze and protect your network like a pro!

Wireshark is an extremely powerful and versatile tool used in cybersecurity to analyze network traffic. Whether you're a computer security student, a cybersecurity professional or simply curious to learn more about networks, Wireshark is an essential tool to master.

75 minutes



wireshark logo


📡 Introduction

Wireshark is an open-source network protocol analyzer. It lets you capture and analyze network traffic in real time. Whether on your own LAN or on remote networks, Wireshark gives you total visibility of data packets passing through cables and airwaves.

wireshark logo

💡 Why use Wireshark

Wireshark offers many advantages for cybersecurity beginners and network professionals alike. Here are just a few reasons why you should consider using Wireshark:

    • Identifying network problems: Wireshark lets you examine network traffic for performance problems, outages, congestion and configuration errors. It helps you locate bottlenecks and resolve problems quickly.

    • Threat analysis: Wireshark can be used to analyze malicious traffic and detect network attacks such as DDoS attacks, phishing attacks, intrusion attempts and more. This enables you to strengthen your network security and take preventive measures.

    • Learning network protocols: Using Wireshark, you can study network protocols such as TCP/IP, DNS, HTTP and more. This gives you an in-depth understanding of how networks work, and helps you to better diagnose problems.

🕹️ How does Wireshark work?

Wireshark uses capture interfaces to intercept and record network traffic. It can capture data packets from different media types, such as wired Ethernet connections, wireless networks and Bluetooth interfaces. Once the packets have been captured, Wireshark provides advanced analysis features to filter, sort and display the data according to different criteria.

Using Wireshark filters, you can extract specific information from captured network traffic. For example, you can filter packets according to source or destination IP address, port, protocol and so on. This enables you to target relevant packets and obtain precise information.

Want to go further with Wireshark?

Start your cybersecurity training!

Launch your career in cybersecurity and train for the job that fits you. Our online platform allows you to train at your own pace for a quick and efficient increase in skills.

100% online

Theory & Practice

Customized by level

💼 In what professional situations is Wireshark used?

Let's take the example of a company that suspects a leak of confidential information. In this case, a security professional could use Wireshark to capture network traffic and analyze data packets for suspicious activity.

Using Wireshark, the analyst can filter packets according to specific criteria such as source and destination IP addresses, ports used, network protocols and so on. This makes it possible to focus only on relevant traffic and identify any suspicious or unauthorized communications.


The analyst can also use Wireshark's advanced features to reconstruct network conversations, track TCP sessions, analyze protocol headers and inspect packet contents. This enables him to understand how data is exchanged, check whether sensitive information is being transmitted securely, and identify possible information leaks.

In short, Wireshark is an essential tool in a real-life business situation for detecting anomalies, resolving network problems and investigating potential malicious activity.

🦸‍♂️ What business uses Wireshark?

Ethical Hackers, also known as ethical hackers or pentesters, use Wireshark as part of their activities to assess the security of systems, networks and applications. Here's how Wireshark is used in the field of ethical hacking:

  • Network vulnerability assessment: Ethical Hackers use Wireshark to analyze network traffic, detecting weaknesses and potential vulnerabilities. By capturing and analyzing data packets, they can identify open ports, active services and possible vulnerabilities that could be exploited by malicious attackers.

  • Attack and intrusion detection: Wireshark is a valuable tool for detecting network attacks such as intrusion attempts, DDoS attacks, phishing attacks and more. Ethical hackers use Wireshark's advanced features to examine packets and data flows, in order to identify abnormal behavior or suspicious patterns.

  • Forensic analysis: In the event of a security incident


Start your cybersecurity training




100% online

Breathe new life into your career with our cybersecurity training courses

Wireshark is an open-source network traffic analysis tool that captures, visualizes and analyzes data packets circulating on a network.

Wireshark offers many benefits, including the ability to diagnose network problems, detect intrusions, perform performance tests, analyze network protocols and enhance overall network security.

Wireshark lets you capture network traffic by selecting the appropriate network interface, starting the capture and saving packets to a file for later analysis.

Wireshark can analyze a wide range of network protocols such as TCP, UDP, IP, HTTP, DNS, FTP, SSH and many more.

Yes, Wireshark offers powerful filtering features that allow you to select and analyze specific data based on criteria such as IP addresses, ports, protocols, keywords, etc.

 Yes, Wireshark is available for major operating systems such as Windows, macOS and Linux, enabling it to be used on a wide range of platforms.

Wireshark is a powerful tool, but should be used with care. We recommend using it in a controlled environment, or on networks you are authorized to analyze. Furthermore, Wireshark should not be used for malicious or espionage activities.

icon lockcadenas

Content reserved for subscribers

Register for the full course and start your cybersecurity training!

  • Over 700 hours of content available
  • 6 training paths
  • Certification courses
  • 100% online and autonomous