Analyze Various Data Sources to Confirm Suspected Infection

Students will review network traffic to confirm the presence of malicious activity using various tools including Wireshark and VirusTotal.com.

Overview

Students will review network traffic to confirm the presence of malicious activity using various tools including Wireshark and VirusTotal.com.

Learning Partner
CYBRScore
CYBRScore
Cybersecurity Technical Hands-on Labs