Coming mid-July
Cybrary Reimagined.
People first, Security first.
Coming mid-July.
Cybrary Reimagined.
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer!
People first, Security first.
Valid until October 31. Elevate your skills today!
Start for free

Implement Network Security Solutions for Data Flow

In this lab, you will learn how to implement network activity monitoring and use a protocol analyzer. First, you will use Resource Monitor to identify active network connections and the associated remote IP addresses, and then monitor network data flow by using TCPView. Next, you will track network data flow with NetWorx, and then use Wireshark to observe network data flow. Finally, you will use Wireshark display filters to evaluate network data flow.

Overview

In this lab, you will learn how to implement network activity monitoring and use a protocol analyzer. First, you will use Resource Monitor to identify active network connections and the associated remote IP addresses, and then monitor network data flow by using TCPView. Next, you will track network data flow with NetWorx, and then use Wireshark to observe network data flow. Finally, you will use Wireshark display filters to evaluate network data flow.

Learning Partner
Skillable
Skillable
Ready-built content across a variety of topics and technologies