Summary
In this chapter, you have learned how to perform packet captures and analyze a capture. We explored the difference between encrypted traffic and clear text and how these can be seen within a packet capture. Finally, we explored how packet capturing is done within cloud environments and highlighted some best practices to follow when performing packet capturing. In the next chapter, we will dive into a bit of cryptography where you will learn about various encryption algorithms and how they are used today.