Tonight the Cyber students were introduced to the idea of how computers and devices are connected through networks. They learned some basics on how they work, their architecture, and the importance of having secure networks. They then participated in an activity using software called WireShark, which allows them to hack into unsecured websites to capture and analyze packets being sent over the network they are connected to.

Click here for more photos!

Tonight the Cyber students were introduced to the idea of how computers and devices are connected through networks. They learned some basics on how they work, their architecture, and the importance of having secure networks. They then participated in an activity using software called WireShark, which allows them to hack into unsecured websites to capture and analyze packets being sent over the network they are connected to.

Tonight the Cyber students were introduced to the idea of how computers and devices are connected through networks. They learned some basics on how they work, their architecture, and the importance of having secure networks. They then participated in an activity using software called WireShark, which allows them to hack into unsecured websites to capture and analyze packets being sent over the network they are connected to.

Tonight the Cyber students were introduced to the idea of how computers and devices are connected through networks. They learned some basics on how they work, their architecture, and the importance of having secure networks. They then participated in an activity using software called WireShark, which allows them to hack into unsecured websites to capture and analyze packets being sent over the network they are connected to.

Tonight the Cyber students were introduced to the idea of how computers and devices are connected through networks. They learned some basics on how they work, their architecture, and the importance of having secure networks. They then participated in an activity using software called WireShark, which allows them to hack into unsecured websites to capture and analyze packets being sent over the network they are connected to.

 


You May Also Like

Departure Day

It’s time to say farewell to our Data Science students. They had one final TA group meeting and…

Final Farewells

It’s time to say farewell to our Aerospace students. They had one final TA group meeting and a…

Saying Our Goodbyes

It’s time to say farewell to our Engineering students. They had one final TA group meeting and a…