Overview
In this lab, you will assume the role of a Cyber Defense Analyst who has received a packet capture on an anomalous activity. Your task is to analyze the packet and use Snort to implement rules that will flag this anomalous behavior in the future. This assessment is one of five and focuses on items related to intrusion detection and prevention.
Learning Partner
CYBRScore
Cybersecurity Technical Hands-on Labs