Overview

Students will scan a network and identify rogue devices. Students will then customize the firewall rules to ensure that any rogue devices are blocked from communicating with other systems on the network.

INSIDER PRO

$99/mo

Subscribe to become an Insider Pro and get access to this app as well as:

Unlimited access to 700+ apps, including virtual labs, practice tests, capture-the-flag challenges, and more
Industry certification preparation
Guided Mentor
Premium support
Subscribe