Understand what ports and protocols are used to communicate in modern IT environments. Students will then use Wireshark to try to match “mystery” packet captures to a hacker’s activity.

Buy Tickets

You’ve Been Hacked! Learn how to investigate a security breach and identify sketchy network traffic.
Tagged on: