Using an assortment of network data acquisition tools and techniques with a focus on open-source, vendor-neutral solutions, students will learn how to perform network traffic and protocol analysis that ultimately supports cybersecurity incident response.