[Abstract]
Learn the basics of cyber threat detection in today's introduction to traffic analysis, where we'll capture computer network traffic and inspect it for suspicious activity. With a combination of Wireshark and network traffic manipulation, we can "tap" an entire network's traffic pipeline and analyze the information passed through it. This is the starting point for adding automated defenses and detection systems to an environment. We can also use Wireshark to view packets captured during post-incident analysis and review.
To learn more about Code Fellows: www.codefellows.org/
-----
JOIN OUR ONLINE COMMUNITY: bit.ly/csnpslack
Linkedin Handle: / csnp
Twitter Handle: / cybersecuritynp
RU-vid: / @csnp_org
Learn about us: www.csnp.org/
Speak at one of our events: www.csnp.org/speak
Volunteer with us: www.csnp.org/volunteer
Donate to our cause!: www.csnp.org/donate
20 апр 2021