Rogue Device Identification and Blocking

Do you know how to spot and stop unusual network activity? In this scenario-based lab, you will scan a network and identify rogue devices. You will then customize the firewall rules to ensure that any rogue devices are blocked from communicating with other systems on the network.

Time
1 hour
Difficulty
Intermediate
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Overview

Do you know how to spot and stop unusual network activity? In this scenario-based lab, you will scan a network and identify rogue devices. You will then customize the firewall rules to ensure that any rogue devices are blocked from communicating with other systems on the network.