The readings in this module introduce a number of different functions of network traffic analysis that can be leveraged to strategically serve a business and its operations. For your main post, address the following capabilities related to traffic analysis functionality and usage:
- Describe traffic analysis and identify common uses.
- Explain how you would use traffic analysis to help defend against common cyberattacks.
- Identify some tools that can be used to perform network traffic analysis.