Network Threat Analysis
Click on any device or the firewall to view its logs. Use the logs to identify the origin system, infected machines, and clean devices, then submit your assessment. If you need help, check the student guide at the bottom
Click on any device or the firewall to view its logs. Use the logs to identify the origin system, infected machines, and clean devices, then submit your assessment. If you need help, check the student guide at the bottom