“Intro to the Challenge of Cybersecurity – Unit 4 – Lesson 7”

Unit 4 – Lesson 7 – “Data – Networks”

4 Days

Data in transit is also a target for adversaries. The adversary can misuse this data at every level of the protocol stack that implements the network over which the data is transiting. Protections must be in place to prevent adversaries from creating malicious traffic and exploiting systems using this malicious traffic. This lesson will explore common network vulnerabilities and provide hands-on experiences in advanced port scanning, and email tracking.