Skip to main content

Wrap-up; Terms and definitions from Course 6, Module 2

Nice work so far!ddddddddddddddd
Congratulations on capturing and analyzing your first packet.
Let's review what we've covered so far.
First, you learned how network traffic flows provide valuable communications insight.
Through monitoring network activity for indicators of compromise, you learned how to spot unusual network activity, like data exfiltration. 

Then, you learned how to view and capture network traffic using packet sniffers.

Finally, you learned how to inspect packets through packet analysis.
You dissected packet header data fields and analyzed packet captures in detail.

You've made a lot of progress in developing the skills you'll need to prepare for an entry-level role in security.
Coming up, you'll be immersed into the exciting world of incident investigation, where you'll examine the processes behind detecting and containing an incident. I'll meet you there.

Glossary terms from module 2

Command and control (C2): The techniques used by malicious actors to maintain communications with compromised systems

Command-line interface (CLI): A text-based user interface that uses commands to interact with the computer

Data exfiltration: Unauthorized transmission of data from a system

Data packet: A basic unit of information that travels from one device to another within a network

Indicators of compromise (IoC): Observable evidence that suggests signs of a potential security incident

Internet Protocol (IP): A set of standards used for routing and addressing data packets as they travel between devices on a network

Intrusion detection systems (IDS): An application that monitors system activity and alerts on possible intrusions

Media Access Control (MAC) Address: A unique alphanumeric identifier that is assigned to each physical device on a network

National Institute of Standards and Technology (NIST) Incident Response Lifecycle: A framework for incident response consisting of four phases: Preparation; Detection and Analysis; Containment, Eradication and Recovery; and Post-incident activity

Network data: The data that’s transmitted between devices on a network 

Network protocol analyzer (packet sniffer): A tool designed to capture and analyze data traffic within a network

Network traffic: The amount of data that moves across a network 

Network Interface Card (NIC): hardware that connects computers to a network

Packet capture (p-cap): A file containing data packets intercepted from an interface or network

Packet sniffing: The practice of capturing and inspecting data packets across a network

Playbook: A manual that provides details about any operational action

Root user (or superuser): A user with elevated privileges to modify the system

Sudo: A command that temporarily grants elevated permissions to specific users

tcpdump: A command-line network protocol analyzer

Wireshark: An open-source network protocol analyzer