Abstract
This project was completed for a network security and analysis class. The purpose was to examine suspicious network traffic on a simulated business network. Investigation results are summarized/simplified in a high-level presentation that targets a C-suite audience.
Preview
/
[pdf]