Learning Objectives
Plan for Data Collection:
Based on guided, hands-on lab exercises, independently completed challenge problems, and Distance Learning (DL) analysis problems, students will be able to systematically plan for data collection, in accordance with the guidelines provided by the course material.
Capture Traffic of Interest:
Based on guided, hands-on lab exercises, independently completed challenge problems, and DL analysis problems students will capture traffic of interest, in accordance with the guidelines provided by the course material.
Analyze Traffic:
Based on guided, hands-on lab exercises, independently completed challenge problems, and DL analysis problems, students will analyse the traffic in accordance with the guidelines provided by the course material.
Demonstrate Appropriate NT Actions:
Based on guided, hands-on lab exercises, independently completed challenge problems, and DL analysis problems on traffic analysis, students will demonstrate appropriate action as a result of the analysis in accordance with the guidelines provided by the course material.
Employ Expert Systems:
For a given data collection, students will be able to determine who is talking, what applications are being used, filter on conversations of interest, create statistical graphs related to issues of interest, employ expert systems to recognize anomalies and diagnose problem areas in accordance with the guidelines provided by the course material.
Demonstrate Network Analysis, Troubleshooting, Security Analysis and Performance Evaluation Methods:
Given the skills acquired during the course, students will demonstrate general analysis, network troubleshooting, security analysis, and application performance evaluation in accordance with the guidelines provided by the course material.
Apply Wireshark/Tshark/Kismet/LibCap/Wincap Tools:
Based on guided, hands-on lab exercises, independently completed challenge problems, and DL analysis problems students will demonstrate the use of Wireshark, tshark, kismet, and libpcap/Wincap in accordance with the guidelines provided by the course material.
Describe Wireshark Functionality:
Based on guided, hands-on lab exercises, independently completed challenge problems, and DL analysis problems, students will describe functionaility of Wireshark to include dissector evaluation, capture filters, display filters, and IO graph development in accordance with the guidelines provided by the course material
Prevent Cyberattacks:
Based on guided, hands-on lab exercises, independently completed challenge problems, and DL analysis problems students will identify the precursors of a cyber attack to allow them to take preventive measures in accordance with the guidelines provided by the course material.
Diagnose Root Causes of Suspect Traffic:
In the case of forensic analysis, students will be able to identify suspect traffic and make associations to identify root causes in accordance with the guidelines provided by the course material.