Where do you begin in network traffic analysis? Learn the process for examining a live or pre-recorded packet capture file using graphical tools such as Wireshark. Is there malicious activity? Learn to think like an attacker, going through the same methods the attacker would, to assess whether what you’re seeing is “normal” or signs of an attack. At the same time, students will run basic network scans using nmap, while seeing how they appear in Wireshark. Finally, students will analyze packet traces indicative of HTTP-based attacks.

    Prerequisites

    Basic familiarity with TCP/IP networking (advanced knowledge not required) and familiarity with the Unix/Linux command line.

    Expected Duration

    2 hours, self-paced. Pause and continue at any time.
    2 CPEs awarded on successful completion.

    Cyber Workforce Platform

    Lorem ipsum dolor sit amet, consectetur adipiscing elit. Donec sed finibus nisi, sed dictum eros.
    Copyright © 2024 Divi. All Rights Reserved.