SCOS is partner of the Wireshark University of Laura Chappell.
The Wireshark University Europe is a training organization for Wireshark (formerly Ethereal), the world's most popular protocol analyzer. Formed in cooperation with key contributors to the Wireshark product, including Wireshark author Gerald Combs and WinPcap creator Loris Degioanni, Wireshark University offers training on network analysis, troubleshooting, security and optimization.
Until now, IT professionals using the Wireshark open source analyzer had to teach themselves to decipher packets and detect vulnerabilities on the network. The education and certification programs shorten the learning curve--making networks safer and more stable in a shorter period of time.
SCOS also offers additional training with Wireshark for WiFi / 802.11 Network Analysis, VoIP Network Analysis and CSI – Cyber Security Investigations.
Wireshark 1: Troubleshooting TCP/IP Networks (Wireshark University)
In this lab-based course, you will discover effective Wireshark operations and packet-level TCP/IP communications by examining both properly and poorly performing networks. Spend half your class time learning the features of Wireshark, the world's most popular analyzer. After that, you'll focus on reviewing both the normal and abnormal communication patterns of the TCP/IP suite and most common applications, including DHCP, DNS, FTP, Telnet, HTTP, POP, and SMTP.
Wireshark 2: Advanced Network/Security Analysis
In this lab-based course, you will gain the skills required to effectively troubleshoot and secure a TCP/IP network by analyzing network traffic with Wireshark. Spend half of your class time learning techniques to analyze traffic on poorly performing TCP/IP networks using the world's most popular analyzer, Wireshark. After that, you will learn to identify reconnaissance processes on the network and indications that a host is compromised. With the strong emphasis on hands-on lab exercises and real-world case studies in this course, you will gain skills you can use immediately following the class. On the last day of class, you will review Wireshark functionality, TCP/IP troubleshooting, and security.
CSI - Cyber Security Investigation and Network Forensic Analysis
Practical Techniques for Analyzing Suspicious Network Traffic
This course is designed for Network Security and Law Enforcement Personnel that possess a basic to intermediate general security and networking knowledge. Successful completion of this course will provide these individuals with a path-way into the field of Network Forensics Analysis. Personnel that already posses a working knowledge of Host-based Forensics Analysis should also attend this course as a means of gaining expertise in the End-to-End Digital Forensics process.
WiFi and WLAN Network Analysis
Practical Techniques for Analyzing and Optimizing Wireless Traffic
This course is designed for Wireless Network Engineers, and Ethernet Network engineers desiring to add wireless capabilities to an existing network that possess a basic to intermediate general networking knowledge. Successful completion of this course will provide these individuals with a skill-set and path-way into the field of Network and Wireless Analysis.
Voice over IP (VoIP) Analysis
Practical Techniques for Analyzing and Optimizing VoIP Traffic
This course is designed for Network Engineers, VoIP and Network Telephony Personnel that possess a basic to intermediate general VoIP/Telephony and networking knowledge. Successful completion of this course will provide these individuals with a skill-set and path-way into the field of Network and VoIP Analysis. Recommended Course Prerequisites: For maximum effectiveness, attendees should have at least basic familiarity with TCP/IP networking, VoIP fundamentals and basic network infrastructure devices such as Switches, Routers, etc. Attendees will also be required to bring their own laptop.
NEW: Windows Digital Forensics Course
Windows administrator/ windows forensic analysts or Law Enforcement personnel with basic knowledge of the Microsoft Windows architecture- but no knowledge of Windows Digital forensic. Upon competition, the user will be positioned as an effective Windows Digital forensic analyst / administrator. Good knowledge level and understanding to allow efficient preserving, extracting and analyzing digital evidence in windows system.