Overview
Do you know how to spot and stop unusual network activity? In this scenario-based lab, you will scan a network and identify rogue devices. You will then customize the firewall rules to ensure that any rogue devices are blocked from communicating with other systems on the network.
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468ec0292bf43b5bc66a5c3_Rogue_Device_Identification_and_Blocking.png)
Learning Partner
![CYBRScore](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/64744bb1dac63cc4698c7781_browse-cybrscore-logo.png)
CYBRScore
Cybersecurity Technical Hands-on Labs