Professional Documents
Culture Documents
Trace File Analysis Course Set 1 PDF
Trace File Analysis Course Set 1 PDF
Written by Laura Chappell Tuesday, 08 February 2011 23:16 - Last Updated Tuesday, 08 February 2011 23:38
Watch Laura analyze various traffic patterns including: honeypots attacking each other a printing problem illegal source IP address someone sneaking traffic through the network a network scan a lousy hotel network ARP process during a bootup sequence ARP used to ping a local host ARP used for discovery bruteforce password cracking
This class includes the trace files (click the Documents button on the icon toolbar) for you to practice on!
{njaccess 0}Click here to register and purchase an All Access Pass now.{/njaccess}
1/1