Browse Resources

Information and Security Technologies -- Security, information assurance, and forensics

Resources

Screenshot for Wireshark Part 2
This video, presented by instructor Tony Hills from the Cybersecurity Education for Advanced Manufacturing Organizations project, is the second in a series of lectures on using the Wireshark packet-capturing program. This lecture focuses on how Wireshark presents and formats captured data. It...
Screenshot for Wireshark Part 3
The video, presented by instructor Tony Hills from the Cybersecurity Education for Advanced Manufacturing Organizations project, is the third in a series about using Wireshark for packet captures. Hill discusses how to control and display captured network data using display filters and capture...
Screenshot for Wireshark Part 4
This video, presented by instructor Tony Hills from the Cybersecurity Education for Advanced Manufacturing Organizations project, is the fourth in a series of lectures on using the Wireshark packet-capturing program. In this video, Hills focuses on utilizing filters in Wireshark to control the...
Screenshot for Wireshark Part 5
This video, presented by instructor Tony Hills from the Cybersecurity Education for Advanced Manufacturing Organizations project, is the last in a series of lectures on using the Wireshark packet-capturing program. In this video, Hills explains that while simply running Wireshark is not enough to...
Screenshot for Wireshark Scenario
This collection of resources, from the Cybersecurity Education for Advanced Manufacturing Organizations project, is a part of the Wireshark Scenario. This scenario is a training module that introduces Wireshark, a free program used to monitor and inspect network traffic. The module teaches the...
Screenshot for Wiresharkv2 - Part 1
This video, presented by instructor Tony Hills from the Cybersecurity Education for Advanced Manufacturing Organizations project, is the first in a series that introduces the use of Wireshark V2 for packet capture, emphasizing its application in both industrial control systems and standard IT...
Screenshot for Wiresharkv2 - Part 2
This video, presented by instructor Tony Hills from the Cybersecurity Education for Advanced Manufacturing Organizations project, is the second in a series that introduces the use of Wireshark V2 for packet capture. During the video, Hills provides a detailed overview of the Wireshark interface,...
Screenshot for Wiresharkv2 - Part 3
This video, presented by instructor Tony Hills from the Cybersecurity Education for Advanced Manufacturing Organizations project, is the third in a series that introduces the use of Wireshark V2 for packet capture. During the video, Hills explains the difference between display filters, which refine...
Screenshot for Wiresharkv2 - Part 4
This video, presented by instructor Tony Hills from the Cybersecurity Education for Advanced Manufacturing Organizations project, is the fourth in a series that introduces the use of Wireshark V2 for packet capture. The video focuses on using Wireshark's Follow Stream option, which consolidates...
Screenshot for Workforce Study: Community College Cybersecurity Alumni
This study, provided by the National Cybersecurity Training and Education Center (NCyTE), examines the cybersecurity jobs filled by community college graduates and their alignment with the NIST/NICE Project's list of 52 specialized cybersecurity work roles. The study was conducted by the NCyTE and...
← Previous