{"id":10428,"date":"2019-07-04T19:49:16","date_gmt":"2019-07-04T22:49:16","guid":{"rendered":"https:\/\/www.ethicalhacker.com.br\/site\/?p=10428"},"modified":"2019-07-16T13:38:15","modified_gmt":"2019-07-16T16:38:15","slug":"curso-gratuito-de-wireshark","status":"publish","type":"post","link":"https:\/\/www.ethicalhacker.com.br\/site\/2019\/07\/exploits\/curso-gratuito-de-wireshark\/","title":{"rendered":"Curso Gratuito de Wireshark"},"content":{"rendered":"<div class=\"clp-component-render\">\n<p><strong>Wireshark Abordagem B\u00e1sica<\/strong><\/p>\n<\/div>\n<p>Aprenda Utilizar o Mais Poderoso Analisador de Protocolos de Redes de Computadores<\/p>\n<div class=\"what-you-get\">\n<div class=\"js-simple-collapse js-simple-collapse--what-you-get\" data-purpose=\"course-objectives\" data-more=\"Ver mais\">\n<div class=\"js-simple-collapse-inner\">\n<div class=\"what-you-get__content\">\n<div class=\"what-you-get__title\"><strong>O que voc\u00ea aprender\u00e1<\/strong><\/div>\n<div><\/div>\n<ul class=\"what-you-get__items\">\n<li class=\"what-you-get__item what-you-get__item--columns\"><span class=\"what-you-get__text\">Conhe\u00e7a o analizador de Protocolos Wireshark<\/span><\/li>\n<li>Aprenda atrav\u00e9s de laborat\u00f3rios b\u00e1sicos e pr\u00e1ticos, a arte de capturar pacotes em redes de computadores.<\/li>\n<\/ul>\n<\/div>\n<div class=\"row row--component-margin\">\n<div class=\"col-xxs-8 left-col\">\n<div class=\"clp-component-render\">\n<div class=\"requirements\" data-purpose=\"course-requirements\">\n<div class=\"requirements__title\"><strong>Requisitos<\/strong><\/div>\n<div class=\"requirements__content\">\n<ul class=\"requirements__list\">\n<li class=\"requirements__item\">Conhecimentos b\u00e1sicos em redes de computadores<\/li>\n<li class=\"requirements__item\">Dom\u00ednio ferramenta Graphical Network Simulator GNS3<\/li>\n<li class=\"requirements__item\">Conhecimentos b\u00e1sicos em Sistemas Operacionais , Linux , Windows ou Mac OS<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"row row--component-margin\">\n<div class=\"col-xs-8 left-col\" data-purpose=\"curriculum-practice-test\"><\/div>\n<\/div>\n<div class=\"row row--component-margin\">\n<div class=\"col-xxs-8 left-col\">\n<div class=\"clp-component-render\">\n<div class=\"description js-user-tracker-click\" data-purpose=\"course-description\" data-user-tracker-schema=\"action-logs\" data-user-tracker-object-id=\"2434434\" data-user-tracker-action=\"full-description-read\" data-user-tracker-target-selector-class=\"js-simple-collapse-more-btn\">\n<div class=\"js-simple-collapse js-simple-collapse--description\" data-more=\"+ Ver mais\" data-purpose=\"collapse-description-btn\">\n<div class=\"js-simple-collapse-inner\" data-purpose=\"collapse-description-text\">\n<div class=\"description__title\"><strong>Descri\u00e7\u00e3o<\/strong><\/div>\n<div class=\"\">\n<p>O Wireshark \u00e9 um analisador de protocolos gratuito , \u00e9 a ferramenta n\u00famero um para an\u00e1lise de pacotes em redes de computadores, apoiando em diagn\u00f3sticos e solu\u00e7\u00f5es de\u00a0 problemas.<\/p>\n<p>Este curso \u00e9 uma abordagem b\u00e1sica sobre a ferramenta , s\u00e3o apresentados laborat\u00f3rios b\u00e1sicos e pr\u00e1ticos onde voc\u00ea poder\u00e1 conhecer\u00a0 mais a fundo a ferramenta.<\/p>\n<p>&nbsp;<\/p>\n<div class=\"audience\" data-purpose=\"course-audience\">\n<div class=\"audience__title\"><strong>Para quem \u00e9 este curso:<\/strong><\/div>\n<ul class=\"audience__list\">\n<li>Alunos de Cursos de Redes de Computadores<\/li>\n<li>Alunos de Cursos de Seguran\u00e7a da Informa\u00e7\u00e3o<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"clp-component-render\">\n<p><strong>Link do curso:<\/strong><\/p>\n<p><a title=\"GNS3\" href=\"https:\/\/www.udemy.com\/wireshark-abordagem-basica\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.udemy.com\/wireshark-abordagem-basica\/<\/a><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<p><strong>Sobre o instrutor<\/strong><\/p>\n<div class=\"clp-component-render\">\n<p><img loading=\"lazy\" decoding=\"async\" class=\"user-avatar user-avatar--image\" src=\"https:\/\/i.udemycdn.com\/user\/200_H\/58636714_2d51_2.jpg\" alt=\"S\u00edlvio C\u00e9sar Giavaroto\" width=\"96\" height=\"96\" aria-label=\"S\u00edlvio C\u00e9sar Giavaroto\" data-purpose=\"instructor-image\" \/><\/p>\n<div class=\"instructor--instructor__title-and-job-title--1nr2Z\">\n<div class=\"instructor--instructor__title--2-Bub\"><a class=\"instructor--title__link--1NJ6S\" href=\"https:\/\/www.udemy.com\/user\/silvio-cesar-giavaroto\/\">S\u00edlvio C\u00e9sar Giavaroto<\/a><\/div>\n<div><\/div>\n<div><\/div>\n<div class=\"instructor--instructor__job-title--opFWR\"><strong>Professor<\/strong><\/div>\n<\/div>\n<div class=\"instructor--instructor__description--1A0ot\">\n<div class=\"instructor--instructor__description-content--1CtQI\" data-purpose=\"description-content\">\n<div>\n<p>Possui gradua\u00e7\u00e3o no Curso Superior de Tecnologia em Redes de Computadores, P\u00f3s-Graduado MBA &#8211; Especialista em Seguran\u00e7a da Informa\u00e7\u00e3o pelo Instituto Paulista de P\u00f3s-Gradua\u00e7\u00e3o IPPG.<\/p>\n<p>\u2022Professor de N\u00edvel Superior na \u00e1rea de sistemas de informa\u00e7\u00e3o e redes de computadores;<\/p>\n<p>\u2022J\u00e1 atuei como instrutor academia Cisco CCNA, C|EH Certified Ethical Hacker e C|HFI Computer Hacking Forensic Investigator ;<\/p>\n<p>\u2022Autor de livros voltados a \u00e1rea de seguran\u00e7a de sistemas e redes de computadores, exerce tamb\u00e9m fun\u00e7\u00f5es de revisor t\u00e9cnico de livros na mesma \u00e1rea.<\/p>\n<p><strong>CERTIFICA\u00c7\u00d5ES:<\/strong><\/p>\n<p>C|EH Certified Ethical Hacker da INTERNATIONAL COUNCIL OF E-COMMERCE CONSULTANTS<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Wireshark Abordagem B\u00e1sica Aprenda Utilizar o Mais Poderoso Analisador de Protocolos de Redes de Computadores O que voc\u00ea aprender\u00e1 Conhe\u00e7a o analizador de Protocolos Wireshark Aprenda atrav\u00e9s de laborat\u00f3rios b\u00e1sicos e pr\u00e1ticos, a arte de capturar pacotes em redes de computadores. Requisitos Conhecimentos b\u00e1sicos em redes de computadores Dom\u00ednio ferramenta Graphical Network Simulator GNS3 Conhecimentos [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":10430,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[89,100,21,105,99],"tags":[],"class_list":["post-10428","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-basico","category-diversos","category-exploits","category-noticias","category-novidades"],"_links":{"self":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/10428","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/comments?post=10428"}],"version-history":[{"count":2,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/10428\/revisions"}],"predecessor-version":[{"id":10431,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/10428\/revisions\/10431"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media\/10430"}],"wp:attachment":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media?parent=10428"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/categories?post=10428"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/tags?post=10428"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}