Network Traffic Analysis

Description

Please do the Introduction and Conclusion inside the attached document ONLY and include references in APA format at the end.

Don't use plagiarized sources. Get Your Custom Assignment on
Network Traffic Analysis
From as Little as $13/Page

Questions 1-10 are answered with my screenshots.

Utilize the screenshots to answer the Introduction and Conclusion questions in the lab sheet.

Learning Outcomes:

implement a sniffer on the network to detect malicious network activity.
parse through large network captures to search for key indicators of compromise.
evaluate network traffic and determine whether the traffic is encrypted

Tools used:

#NetworkMiner
#WireShark
#nmap
#WinSCP
#apache