Network Forensics Tools

Network Forensics Tools

After reviewing the video below, discuss your observations/lessons learned, and what other steps could be taken, from a network forensics perspective, to analyze malware with similar TTPs as the Zyklon Trojan.

PLEASE WATCH VIDEO BEFORE ANSWERING QUESTION

Leave a Reply

Your email address will not be published. Required fields are marked *