Protocol Analysis
In this lab, you will assume the role of a Cyber Defense Analyst who has received a packet capture on an anomalous activity. Your task is to analyse the packet capture and generate a report on your findings. This assessment is one of five and is focused specifically on items related to protocol analysis.
Difficulty
Intermediate
Share
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Overview
In this lab, you will assume the role of a Cyber Defense Analyst who has received a packet capture on an anomalous activity. Your task is to analyse the packet capture and generate a report on your findings. This assessment is one of five and is focused specifically on items related to protocol analysis.
Learning Partner