Please enable JavaScript to use CodeHS

Arkansas Cybersecurity Year 3: CSCS.Y3.8.4

CodeHS Lessons

Analyze network traffic for suspicious or malicious activity using a protocol analyzer (e.g., NetworkMiner, Wireshark, Zeek)