APA (edition "APA 7") Computer Science

Network Forensics Tools

Network Forensics Tools

After reviewing the video below, discuss your observations/lessons learned, and what other steps could be taken, from a network forensics perspective, to analyze malware with similar TTPs as the Zyklon Trojan.

PLEASE WATCH VIDEO BEFORE ANSWERING QUESTION