Hand's on use of Network Security and Traffic Analysis concepts to spot and probe network anomalies using industry tools and techniques.
-
Updated
Nov 5, 2025
Hand's on use of Network Security and Traffic Analysis concepts to spot and probe network anomalies using industry tools and techniques.
Simulated and detected a stealthy insider threat ‘Alex’, who moved from file snooping to SSH brute-forcing. Includes PCAPs, Zeek logs, NetworkMiner analysis, and a full incident report.
Add a description, image, and links to the networkminer topic page so that developers can more easily learn about it.
To associate your repository with the networkminer topic, visit your repo's landing page and select "manage topics."