Featured resource
2025 Tech Upskilling Playbook
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Check it out
  • Lab
    • Libraries: If you want this lab, consider one of these libraries.
    • Security
Google Cloud Platform icon
Labs

Anomaly Detection in Network Traffic

In this lab, you’ll practice analyzing network traffic to identify suspicious activities and data theft. When you’re finished, you’ll have the skills to detect anomalies and document findings to support incident response and defense strategies.

Google Cloud Platform icon
Lab platform
Lab Info
Rating
(25)
Level
Beginner
Last updated
Aug 04, 2025
Duration
40m

Contact sales

By filling out this form and clicking submit, you acknowledge our privacy policy.
Table of Contents
  1. Challenge

    Getting Started in the Lab Environment

    Here are the initial instructions and explanation of the lab environment. Read this while your environment is busy creating itself from nothing. Yes, this violates physics; we know. How fun!

  2. Challenge

    Detecting Suspicious Login Activity

    Globomantics Intrusion Detection System (IDS) flagged unusually high-rate traffic to the HTTP File Server. You have to analyze the network traffic to identify patterns of suspicious login attempts, determine whether unauthorized access occurred, and review additional details, such as the brute force transfer rate, to understand the attack pattern better.

  3. Challenge

    Tracing Sensitive File Access and Data Exfiltration

    Globomantics HTTP File Server logs show requests for specific files containing sensitive information, such as FTP credentials. Your task is to analyze the network traffic, locate the request for the file, and extract its contents to confirm if sensitive data was accessed.

  4. Challenge

    Investigating Bypassed Restrictions and Unauthorized FTP Access

    Globomantics IDS detected anomalous ICMP and SSH activity, followed by FTP transfers. Your task is investigating the ICMP pings, analyzing SSH traffic, and identifying FTP data transfers that indicate successful unauthorized access. Using the FTP credentials discovered earlier, the attacker downloaded sensitive files, which you must uncover and analyze.

  5. Challenge

    The Last Challenge

    Welcome to the final challenge! This is your last chance to experiment in the environment. Clicking Finish Lab will end this little world that flittered into existence just for you.

About the author

Sahil Gupta is highly skilled in Product Security, specializing in DevSecOps and Application Security. They are passionate about enhancing security posture & delivering robust and secure solutions.

Real skill practice before real-world application

Hands-on Labs are real environments created by industry experts to help you learn. These environments help you gain knowledge and experience, practice without compromising your system, test without risk, destroy without fear, and let you learn from your mistakes. Hands-on Labs: practice your skills before delivering in the real world.

Learn by doing

Engage hands-on with the tools and technologies you’re learning. You pick the skill, we provide the credentials and environment.

Follow your guide

All labs have detailed instructions and objectives, guiding you through the learning process and ensuring you understand every step.

Turn time into mastery

On average, you retain 75% more of your learning if you take time to practice. Hands-on labs set you up for success to make those skills stick.

Get started with Pluralsight