Overview
Do you know how to spot and stop unusual network activity? In this scenario-based lab, you will scan a network and identify rogue devices. You will then customize the firewall rules to ensure that any rogue devices are blocked from communicating with other systems on the network.
Learning Partner
CYBRScore
Cybersecurity Technical Hands-on Labs