Summary
Over the course of this chapter, you gained the skills and hands-on experience in using Wireshark to perform packet analysis to identify potentially malicious traffic, and learned how to set up and use Security Onion to monitor and detect potential threats in a network.
Lastly, I know the journey of becoming a cybersecurity professional, such as an ethical hacker and penetration tester, has many challenges; there are so many new things to learn and keeping up to date with the ever-changing cyber-threat landscape can be tough. These challenges will help you expand your potential and become an industry expert in your field of study and carry you along the path to success, as long as there’s a balance of prioritization, focus, dedication, and time management.
I would personally like to thank you very much for your support in purchasing a copy of my book and congratulations on making it to the end and acquiring all these amazing new skills in performing reconnaissance...