SlideShare a Scribd company logo
1 of 1
At this point, you have been introduced to various security tools (Network Discovery, Network
Scanning, DLP, Firewalls, and HIDS). You are to take one of the five identified categories of
tools and identify two specific products from different vendors. Based on two products, please
research the differences and similarities between the two products. You should also evaluate the
implementation issues you may face with each product. Based on your research, please create a
PowerPoint or a similar presentation to explain your research and your findings of the tools. The
presentation should be comparative in nature as to highlight the similarities between the two
products you researched.
Solution
The two specified product from the different vendors are given below:
1. Wireshark: In the network, this tool is basically used for network protocol analyzer. This tool
helps us to analyze the network, that what happen over the network. Wireshark help us to
analyze the network packets over the network and its also help us detect any problem over the
network.
2. NetStat: Its help us in found out the current state of the active network connections on a host.
It alos a very important tool.

More Related Content

Similar to At this point- you have been introduced to various security tools (Net.docx

Sec 572 Effective Communication / snaptutorial.com
Sec 572  Effective Communication / snaptutorial.comSec 572  Effective Communication / snaptutorial.com
Sec 572 Effective Communication / snaptutorial.comBaileyabl
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAPNIC
 
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Barry Greene
 
SplunkLive! Customer Presentation - SSA
SplunkLive! Customer Presentation - SSASplunkLive! Customer Presentation - SSA
SplunkLive! Customer Presentation - SSASplunk
 
Device discovery for vulnerability assessment: Automating the Handoff
Device discovery for vulnerability assessment: Automating the HandoffDevice discovery for vulnerability assessment: Automating the Handoff
Device discovery for vulnerability assessment: Automating the Handoffnathan-axonius
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistMyNOG
 
Basic Dynamic Analysis of Malware
Basic Dynamic Analysis of MalwareBasic Dynamic Analysis of Malware
Basic Dynamic Analysis of MalwareNatraj G
 
SANS 20 Security Controls
SANS 20 Security ControlsSANS 20 Security Controls
SANS 20 Security ControlsCasey Wimmer
 
Choose your own project idea or select one of the following.pdf
Choose your own project idea or select one of the following.pdfChoose your own project idea or select one of the following.pdf
Choose your own project idea or select one of the following.pdfaghsports
 
A Comparison Study of Open Source Penetration Testing Tools
A Comparison Study of Open Source Penetration Testing ToolsA Comparison Study of Open Source Penetration Testing Tools
A Comparison Study of Open Source Penetration Testing Toolsijtsrd
 
Major_Project_Presentaion_B14.pptx
Major_Project_Presentaion_B14.pptxMajor_Project_Presentaion_B14.pptx
Major_Project_Presentaion_B14.pptxLokeshKumarReddy8
 
RSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics PresentationRSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics PresentationAnton Chuvakin
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleGregory Hanis
 
Prototyping with the Internet of Things
Prototyping with the Internet of ThingsPrototyping with the Internet of Things
Prototyping with the Internet of ThingsSarah Ritter
 

Similar to At this point- you have been introduced to various security tools (Net.docx (20)

Sec 572 Effective Communication / snaptutorial.com
Sec 572  Effective Communication / snaptutorial.comSec 572  Effective Communication / snaptutorial.com
Sec 572 Effective Communication / snaptutorial.com
 
App locker
App lockerApp locker
App locker
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
 
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...
 
SplunkLive! Customer Presentation - SSA
SplunkLive! Customer Presentation - SSASplunkLive! Customer Presentation - SSA
SplunkLive! Customer Presentation - SSA
 
Device discovery for vulnerability assessment: Automating the Handoff
Device discovery for vulnerability assessment: Automating the HandoffDevice discovery for vulnerability assessment: Automating the Handoff
Device discovery for vulnerability assessment: Automating the Handoff
 
Security Handbook
 Security Handbook Security Handbook
Security Handbook
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
 
Basic Dynamic Analysis of Malware
Basic Dynamic Analysis of MalwareBasic Dynamic Analysis of Malware
Basic Dynamic Analysis of Malware
 
Wireshark
WiresharkWireshark
Wireshark
 
SANS 20 Security Controls
SANS 20 Security ControlsSANS 20 Security Controls
SANS 20 Security Controls
 
Choose your own project idea or select one of the following.pdf
Choose your own project idea or select one of the following.pdfChoose your own project idea or select one of the following.pdf
Choose your own project idea or select one of the following.pdf
 
A Comparison Study of Open Source Penetration Testing Tools
A Comparison Study of Open Source Penetration Testing ToolsA Comparison Study of Open Source Penetration Testing Tools
A Comparison Study of Open Source Penetration Testing Tools
 
security onion
security onionsecurity onion
security onion
 
Major_Project_Presentaion_B14.pptx
Major_Project_Presentaion_B14.pptxMajor_Project_Presentaion_B14.pptx
Major_Project_Presentaion_B14.pptx
 
Regan, Keller, SF State Securing the vendor mr&ak
Regan, Keller, SF State Securing the vendor mr&akRegan, Keller, SF State Securing the vendor mr&ak
Regan, Keller, SF State Securing the vendor mr&ak
 
RSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics PresentationRSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics Presentation
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
 
Prototyping with the Internet of Things
Prototyping with the Internet of ThingsPrototyping with the Internet of Things
Prototyping with the Internet of Things
 

More from jkristen1

Based on differences in electronegativity- how would you characterize.docx
Based on differences in electronegativity- how would you characterize.docxBased on differences in electronegativity- how would you characterize.docx
Based on differences in electronegativity- how would you characterize.docxjkristen1
 
Balance the redox reaction by inserting the appropriate coefficients-.docx
Balance the redox reaction by inserting the appropriate coefficients-.docxBalance the redox reaction by inserting the appropriate coefficients-.docx
Balance the redox reaction by inserting the appropriate coefficients-.docxjkristen1
 
Auditing and Accounting Cases Investigating Issues of Fraud and Profes (2).docx
Auditing and Accounting Cases Investigating Issues of Fraud and Profes (2).docxAuditing and Accounting Cases Investigating Issues of Fraud and Profes (2).docx
Auditing and Accounting Cases Investigating Issues of Fraud and Profes (2).docxjkristen1
 
b- Impact testing was used to assess which property of the materials-.docx
b- Impact testing was used to assess which property of the materials-.docxb- Impact testing was used to assess which property of the materials-.docx
b- Impact testing was used to assess which property of the materials-.docxjkristen1
 
B- lonic Bonds- Some atoms have such a strong attraction for electrons.docx
B- lonic Bonds- Some atoms have such a strong attraction for electrons.docxB- lonic Bonds- Some atoms have such a strong attraction for electrons.docx
B- lonic Bonds- Some atoms have such a strong attraction for electrons.docxjkristen1
 
b- Does Rutherford-'s model predict the correct spectrum- Answer- Acco.docx
b- Does Rutherford-'s model predict the correct spectrum- Answer- Acco.docxb- Does Rutherford-'s model predict the correct spectrum- Answer- Acco.docx
b- Does Rutherford-'s model predict the correct spectrum- Answer- Acco.docxjkristen1
 
Auditors should perform audit procedures to identify and assess subseq.docx
Auditors should perform audit procedures to identify and assess subseq.docxAuditors should perform audit procedures to identify and assess subseq.docx
Auditors should perform audit procedures to identify and assess subseq.docxjkristen1
 
Auditing and Accounting Cases Investigating Issues of Fraud and Profes.docx
Auditing and Accounting Cases Investigating Issues of Fraud and Profes.docxAuditing and Accounting Cases Investigating Issues of Fraud and Profes.docx
Auditing and Accounting Cases Investigating Issues of Fraud and Profes.docxjkristen1
 
AuditorSolution1) The auditors opinion on internal control is satisfie.docx
AuditorSolution1) The auditors opinion on internal control is satisfie.docxAuditorSolution1) The auditors opinion on internal control is satisfie.docx
AuditorSolution1) The auditors opinion on internal control is satisfie.docxjkristen1
 
Auditing and Accounting Cases Investigating Issues of Fraud and Profes (5).docx
Auditing and Accounting Cases Investigating Issues of Fraud and Profes (5).docxAuditing and Accounting Cases Investigating Issues of Fraud and Profes (5).docx
Auditing and Accounting Cases Investigating Issues of Fraud and Profes (5).docxjkristen1
 
Athens- Inc-- has 9-000 shares of common stock outstanding and the fol.docx
Athens- Inc-- has 9-000 shares of common stock outstanding and the fol.docxAthens- Inc-- has 9-000 shares of common stock outstanding and the fol.docx
Athens- Inc-- has 9-000 shares of common stock outstanding and the fol.docxjkristen1
 
At time 110 four processes (P1 P4) are waiting for a timeout signal-.docx
At time 110 four processes (P1  P4) are waiting for a timeout signal-.docxAt time 110 four processes (P1  P4) are waiting for a timeout signal-.docx
At time 110 four processes (P1 P4) are waiting for a timeout signal-.docxjkristen1
 
At January 1- 2012- Lance Link Corporation had 100-000 shares of $1 pa.docx
At January 1- 2012- Lance Link Corporation had 100-000 shares of $1 pa.docxAt January 1- 2012- Lance Link Corporation had 100-000 shares of $1 pa.docx
At January 1- 2012- Lance Link Corporation had 100-000 shares of $1 pa.docxjkristen1
 
At December 31- 2013- Hansen Corporation had 42-000 shares of common s.docx
At December 31- 2013- Hansen Corporation had 42-000 shares of common s.docxAt December 31- 2013- Hansen Corporation had 42-000 shares of common s.docx
At December 31- 2013- Hansen Corporation had 42-000 shares of common s.docxjkristen1
 
File- LineScrabbleDriver-java -U 4- in-Desktop-Guess this is the death.docx
File- LineScrabbleDriver-java -U 4- in-Desktop-Guess this is the death.docxFile- LineScrabbleDriver-java -U 4- in-Desktop-Guess this is the death.docx
File- LineScrabbleDriver-java -U 4- in-Desktop-Guess this is the death.docxjkristen1
 
Fill out the following table for four different IT systems- Note two.docx
Fill out the following table for four different IT systems-  Note two.docxFill out the following table for four different IT systems-  Note two.docx
Fill out the following table for four different IT systems- Note two.docxjkristen1
 
Figure 9-3 shows an energy diagram for the dissolving of an ionic comp.docx
Figure 9-3 shows an energy diagram for the dissolving of an ionic comp.docxFigure 9-3 shows an energy diagram for the dissolving of an ionic comp.docx
Figure 9-3 shows an energy diagram for the dissolving of an ionic comp.docxjkristen1
 
FakeArrayList first - new FakeArrayl_ist(3)- first-set(2- 7-1)- first-.docx
FakeArrayList first - new FakeArrayl_ist(3)- first-set(2- 7-1)- first-.docxFakeArrayList first - new FakeArrayl_ist(3)- first-set(2- 7-1)- first-.docx
FakeArrayList first - new FakeArrayl_ist(3)- first-set(2- 7-1)- first-.docxjkristen1
 
Explain why workplace spirituality seems to be an important concern-So.docx
Explain why workplace spirituality seems to be an important concern-So.docxExplain why workplace spirituality seems to be an important concern-So.docx
Explain why workplace spirituality seems to be an important concern-So.docxjkristen1
 
Explanation of the similarities and differences between the Income Sta.docx
Explanation of the similarities and differences between the Income Sta.docxExplanation of the similarities and differences between the Income Sta.docx
Explanation of the similarities and differences between the Income Sta.docxjkristen1
 

More from jkristen1 (20)

Based on differences in electronegativity- how would you characterize.docx
Based on differences in electronegativity- how would you characterize.docxBased on differences in electronegativity- how would you characterize.docx
Based on differences in electronegativity- how would you characterize.docx
 
Balance the redox reaction by inserting the appropriate coefficients-.docx
Balance the redox reaction by inserting the appropriate coefficients-.docxBalance the redox reaction by inserting the appropriate coefficients-.docx
Balance the redox reaction by inserting the appropriate coefficients-.docx
 
Auditing and Accounting Cases Investigating Issues of Fraud and Profes (2).docx
Auditing and Accounting Cases Investigating Issues of Fraud and Profes (2).docxAuditing and Accounting Cases Investigating Issues of Fraud and Profes (2).docx
Auditing and Accounting Cases Investigating Issues of Fraud and Profes (2).docx
 
b- Impact testing was used to assess which property of the materials-.docx
b- Impact testing was used to assess which property of the materials-.docxb- Impact testing was used to assess which property of the materials-.docx
b- Impact testing was used to assess which property of the materials-.docx
 
B- lonic Bonds- Some atoms have such a strong attraction for electrons.docx
B- lonic Bonds- Some atoms have such a strong attraction for electrons.docxB- lonic Bonds- Some atoms have such a strong attraction for electrons.docx
B- lonic Bonds- Some atoms have such a strong attraction for electrons.docx
 
b- Does Rutherford-'s model predict the correct spectrum- Answer- Acco.docx
b- Does Rutherford-'s model predict the correct spectrum- Answer- Acco.docxb- Does Rutherford-'s model predict the correct spectrum- Answer- Acco.docx
b- Does Rutherford-'s model predict the correct spectrum- Answer- Acco.docx
 
Auditors should perform audit procedures to identify and assess subseq.docx
Auditors should perform audit procedures to identify and assess subseq.docxAuditors should perform audit procedures to identify and assess subseq.docx
Auditors should perform audit procedures to identify and assess subseq.docx
 
Auditing and Accounting Cases Investigating Issues of Fraud and Profes.docx
Auditing and Accounting Cases Investigating Issues of Fraud and Profes.docxAuditing and Accounting Cases Investigating Issues of Fraud and Profes.docx
Auditing and Accounting Cases Investigating Issues of Fraud and Profes.docx
 
AuditorSolution1) The auditors opinion on internal control is satisfie.docx
AuditorSolution1) The auditors opinion on internal control is satisfie.docxAuditorSolution1) The auditors opinion on internal control is satisfie.docx
AuditorSolution1) The auditors opinion on internal control is satisfie.docx
 
Auditing and Accounting Cases Investigating Issues of Fraud and Profes (5).docx
Auditing and Accounting Cases Investigating Issues of Fraud and Profes (5).docxAuditing and Accounting Cases Investigating Issues of Fraud and Profes (5).docx
Auditing and Accounting Cases Investigating Issues of Fraud and Profes (5).docx
 
Athens- Inc-- has 9-000 shares of common stock outstanding and the fol.docx
Athens- Inc-- has 9-000 shares of common stock outstanding and the fol.docxAthens- Inc-- has 9-000 shares of common stock outstanding and the fol.docx
Athens- Inc-- has 9-000 shares of common stock outstanding and the fol.docx
 
At time 110 four processes (P1 P4) are waiting for a timeout signal-.docx
At time 110 four processes (P1  P4) are waiting for a timeout signal-.docxAt time 110 four processes (P1  P4) are waiting for a timeout signal-.docx
At time 110 four processes (P1 P4) are waiting for a timeout signal-.docx
 
At January 1- 2012- Lance Link Corporation had 100-000 shares of $1 pa.docx
At January 1- 2012- Lance Link Corporation had 100-000 shares of $1 pa.docxAt January 1- 2012- Lance Link Corporation had 100-000 shares of $1 pa.docx
At January 1- 2012- Lance Link Corporation had 100-000 shares of $1 pa.docx
 
At December 31- 2013- Hansen Corporation had 42-000 shares of common s.docx
At December 31- 2013- Hansen Corporation had 42-000 shares of common s.docxAt December 31- 2013- Hansen Corporation had 42-000 shares of common s.docx
At December 31- 2013- Hansen Corporation had 42-000 shares of common s.docx
 
File- LineScrabbleDriver-java -U 4- in-Desktop-Guess this is the death.docx
File- LineScrabbleDriver-java -U 4- in-Desktop-Guess this is the death.docxFile- LineScrabbleDriver-java -U 4- in-Desktop-Guess this is the death.docx
File- LineScrabbleDriver-java -U 4- in-Desktop-Guess this is the death.docx
 
Fill out the following table for four different IT systems- Note two.docx
Fill out the following table for four different IT systems-  Note two.docxFill out the following table for four different IT systems-  Note two.docx
Fill out the following table for four different IT systems- Note two.docx
 
Figure 9-3 shows an energy diagram for the dissolving of an ionic comp.docx
Figure 9-3 shows an energy diagram for the dissolving of an ionic comp.docxFigure 9-3 shows an energy diagram for the dissolving of an ionic comp.docx
Figure 9-3 shows an energy diagram for the dissolving of an ionic comp.docx
 
FakeArrayList first - new FakeArrayl_ist(3)- first-set(2- 7-1)- first-.docx
FakeArrayList first - new FakeArrayl_ist(3)- first-set(2- 7-1)- first-.docxFakeArrayList first - new FakeArrayl_ist(3)- first-set(2- 7-1)- first-.docx
FakeArrayList first - new FakeArrayl_ist(3)- first-set(2- 7-1)- first-.docx
 
Explain why workplace spirituality seems to be an important concern-So.docx
Explain why workplace spirituality seems to be an important concern-So.docxExplain why workplace spirituality seems to be an important concern-So.docx
Explain why workplace spirituality seems to be an important concern-So.docx
 
Explanation of the similarities and differences between the Income Sta.docx
Explanation of the similarities and differences between the Income Sta.docxExplanation of the similarities and differences between the Income Sta.docx
Explanation of the similarities and differences between the Income Sta.docx
 

Recently uploaded

social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 

Recently uploaded (20)

social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 

At this point- you have been introduced to various security tools (Net.docx

  • 1. At this point, you have been introduced to various security tools (Network Discovery, Network Scanning, DLP, Firewalls, and HIDS). You are to take one of the five identified categories of tools and identify two specific products from different vendors. Based on two products, please research the differences and similarities between the two products. You should also evaluate the implementation issues you may face with each product. Based on your research, please create a PowerPoint or a similar presentation to explain your research and your findings of the tools. The presentation should be comparative in nature as to highlight the similarities between the two products you researched. Solution The two specified product from the different vendors are given below: 1. Wireshark: In the network, this tool is basically used for network protocol analyzer. This tool helps us to analyze the network, that what happen over the network. Wireshark help us to analyze the network packets over the network and its also help us detect any problem over the network. 2. NetStat: Its help us in found out the current state of the active network connections on a host. It alos a very important tool.