This conference is suitable for Network Engineers, IT Vendors, Government, and IT Security personnel who use packet analysis to investigate cyber-security threats and IT Performance issues, as well as IT personnel in Governance, Audit, and training.
The Importance of Network Traffic Capture
Network packet capture is the process of intercepting and logging data packets transmitted over a network. This technique allows for the detailed analysis of network traffic, providing crucial insights into the behavior and performance of a network.
Cyber Security
Cyber threats have become increasingly sophisticated and challenging to detect in recent years. In many cases, traditional security measures such as firewalls and intrusion detection systems are insufficient to protect networks from malicious attacks. By capturing packets, organizations can closely monitor incoming and outgoing traffic for any suspicious activity or anomalies that may indicate a cyber-attack. This allows for timely responses and mitigation of potential threats before they cause significant damage. The Kenyan Computer Misuse and Cybercrime (Critical Information Infrastructure and Cybercrime Management) Regulations 2024, emphasize on the need for critical information infrastructure monitoring as a way of preventing & deterring cyber threats to various critical infrastructures such as Energy grids, Banking Systems, Transport Systems among others.
The Network Traffic Analysis Workshop
Murang’a University of Technology in collaboration with Profitap have organized a Network Traffic Analysis User Group Workshop. The Conference will feature a two-day pre-conferencing training on Network Traffic Capture, monitoring & analysis & culminate with a Plenary session on the third day. The workshop aims at bringing together Network Engineers & IT security personnel drawn from the Government, Industry & academia with an aim of discussing best industry practices on matters cyber-security & performance monitoring from a Network Traffic capture & analysis perspective.
DAY 1 | 8AM-5PM | DAY 2 | 8AM-5PM |
---|---|---|---|
Arrival | Where, what and how to capture | Arrival | Client Hello Analysis |
Welcoming note | Lets talk about perfomance analysis | Welcoming note | Server Hello Analysis |
A quick intro to packet analysis ft. wireshark | lunch break | TCP Options | lunch break |
A quick overview of TCP | Overview of IOTA 1G | Troubleshooting slow networks | A quick overview of cloud security & performance analysis |
Tea Break | Case Studies in analysis | Tea Break | Cloud packet capture options |
Packet Capture:What is it and what you need to know | Q & A Session | SSL/ TLS Decryption | OT Traffic access & monitoring |
Click below to chat on WhatsApp or send an email to admissions@mut.ac.ke