You are on page 1of 1

Trace File Analysis Course - Set 1

Written by Laura Chappell Tuesday, 08 February 2011 23:16 - Last Updated Tuesday, 08 February 2011 23:38

Watch Laura analyze various traffic patterns including: honeypots attacking each other a printing problem illegal source IP address someone sneaking traffic through the network a network scan a lousy hotel network ARP process during a bootup sequence ARP used to ping a local host ARP used for discovery bruteforce password cracking

This class includes the trace files (click the Documents button on the icon toolbar) for you to practice on!

{njaccess 0}Click here to register and purchase an All Access Pass now.{/njaccess}

1/1

You might also like