# Wrap-up; Terms and definitions from Course 6, Module 2

<div class="cds-1 css-1shylkf cds-2" id="bkmrk-nice-work-so-far%21ddd"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from current lecture segment: Nice work so far!" class="rc-Phrase active css-13o25cb" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-108 css-80vnnb cds-110">Nice work so far!ddddddddddddddd</span></div><div aria-label="toggle video from Congratulations on capturing" class="rc-Phrase css-13o25cb" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-108 css-80vnnb cds-110">Congratulations on capturing </span><span aria-hidden="true" class="cds-108 css-80vnnb cds-110">and analyzing your first packet. </span></div><div aria-label="toggle video from Let's review what we've covered so far." class="rc-Phrase css-13o25cb" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-108 css-80vnnb cds-110">Let's review what we've covered so far. </span></div><div aria-label="toggle video from First, you learned how network traffic flows" class="rc-Phrase css-13o25cb" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-108 css-80vnnb cds-110">First, you learned how network traffic flows </span><span aria-hidden="true" class="cds-108 css-80vnnb cds-110">provide valuable communications insight. </span></div><div aria-label="toggle video from Through monitoring network activity" class="rc-Phrase css-13o25cb" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-108 css-80vnnb cds-110">Through monitoring network activity </span><span aria-hidden="true" class="cds-108 css-80vnnb cds-110">for indicators of compromise, </span><span aria-hidden="true" class="cds-108 css-80vnnb cds-110">you learned how to spot </span><span aria-hidden="true" class="cds-108 css-80vnnb cds-110">unusual network activity, like data exfiltration. </span></div></div></div></div><div class="cds-1 css-1shylkf cds-2" id="bkmrk-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-1shylkf cds-2" id="bkmrk-then%2C-you-learned-ho"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Then, you learned how to view and capture" class="rc-Phrase css-13o25cb" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-108 css-80vnnb cds-110">Then, you learned how to view and capture </span><span aria-hidden="true" class="cds-108 css-80vnnb cds-110">network traffic using packet sniffers. </span></div></div></div></div><div class="cds-1 css-1shylkf cds-2" id="bkmrk--1"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-1shylkf cds-2" id="bkmrk-finally%2C-you-learned"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Finally, you learned how to inspect" class="rc-Phrase css-13o25cb" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-108 css-80vnnb cds-110">Finally, you learned how to inspect </span><span aria-hidden="true" class="cds-108 css-80vnnb cds-110">packets through packet analysis. </span></div><div aria-label="toggle video from You dissected packet header data fields" class="rc-Phrase css-13o25cb" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-108 css-80vnnb cds-110">You dissected packet header data fields </span><span aria-hidden="true" class="cds-108 css-80vnnb cds-110">and analyzed packet captures in detail. </span></div></div></div></div><div class="cds-1 css-1shylkf cds-2" id="bkmrk--2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-you%27ve-made-a-lot-of"><div aria-label="toggle video from You've made a lot of progress" class="rc-Phrase css-13o25cb" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-108 css-80vnnb cds-110">You've made a lot of progress </span><span aria-hidden="true" class="cds-108 css-80vnnb cds-110">in developing the skills you'll </span><span aria-hidden="true" class="cds-108 css-80vnnb cds-110">need to prepare for an entry-level role in security. </span></div><div aria-label="toggle video from Coming up, you'll be immersed into" class="rc-Phrase css-13o25cb" data-cue="20" data-cue-index="19" role="button" tabindex="0"><span aria-hidden="true" class="cds-108 css-80vnnb cds-110">Coming up, you'll be immersed into </span><span aria-hidden="true" class="cds-108 css-80vnnb cds-110">the exciting world of incident investigation, </span><span aria-hidden="true" class="cds-108 css-80vnnb cds-110">where you'll examine the processes behind detecting </span><span aria-hidden="true" class="cds-108 css-80vnnb cds-110">and containing an incident. I'll meet you there. </span></div><div aria-label="toggle video from Coming up, you'll be immersed into" class="rc-Phrase css-13o25cb" data-cue="20" data-cue-index="19" role="button" tabindex="0">---

</div></div># Glossary terms from module 2

**Command and control (C2):** The techniques used by malicious actors to maintain communications with compromised systems

**Command-line interface (CLI):** A text-based user interface that uses commands to interact with the computer

**Data exfiltration:** Unauthorized transmission of data from a system

**Data packet:** A basic unit of information that travels from one device to another within a network

**Indicators of compromise (IoC):** Observable evidence that suggests signs of a potential security incident

**Internet Protocol (IP):** A set of standards used for routing and addressing data packets as they travel between devices on a network

**Intrusion detection systems (IDS):** An application that monitors system activity and alerts on possible intrusions

**Media Access Control (MAC) Address:** A unique alphanumeric identifier that is assigned to each physical device on a network

**National Institute of Standards and Technology (NIST) Incident Response Lifecycle:** A framework for incident response consisting of four phases: Preparation; Detection and Analysis; Containment, Eradication and Recovery; and Post-incident activity

**Network data:** The data that’s transmitted between devices on a network

**Network protocol analyzer (packet sniffer):** A tool designed to capture and analyze data traffic within a network

**Network traffic:** The amount of data that moves across a network

**Network Interface Card (NIC):** hardware that connects computers to a network

**Packet capture (p-cap):** A file containing data packets intercepted from an interface or network

**Packet sniffing:** The practice of capturing and inspecting data packets across a network

**Playbook:** A manual that provides details about any operational action

**Root user (or superuser)**: A user with elevated privileges to modify the system

**Sudo:** A command that temporarily grants elevated permissions to specific users

**tcpdump:** A command-line network protocol analyzer

**Wireshark:** An open-source network protocol analyzer