Description
Please do the Introduction and Conclusion inside the attached document ONLY and include references in APA format at the end.
Don't use plagiarized sources. Get Your Custom Assignment on
Network Traffic Analysis
From as Little as $13/Page
Questions 1-10 are answered with my screenshots.
Utilize the screenshots to answer the Introduction and Conclusion questions in the lab sheet.
Learning Outcomes:
implement a sniffer on the network to detect malicious network activity.
parse through large network captures to search for key indicators of compromise.
evaluate network traffic and determine whether the traffic is encrypted
Tools used:
#NetworkMiner
#WireShark
#nmap
#WinSCP
#apache