addressalign-toparrow-leftarrow-rightbackbellblockcalendarcameraccwcheckchevron-downchevron-leftchevron-rightchevron-small-downchevron-small-leftchevron-small-rightchevron-small-upchevron-upcircle-with-checkcircle-with-crosscircle-with-pluscontroller-playcrossdots-three-verticaleditemptyheartexporteye-with-lineeyefacebookfolderfullheartglobegmailgooglegroupshelp-with-circleimageimagesinstagramFill 1light-bulblinklocation-pinm-swarmSearchmailmessagesminusmoremuplabelShape 3 + Rectangle 1ShapeoutlookpersonJoin Group on CardStartprice-ribbonprintShapeShapeShapeShapeImported LayersImported LayersImported Layersshieldstartickettrashtriangle-downtriangle-uptwitteruserwarningyahoo

Cybersecurity Workshop

*Network Traffic Analysis*

Join us for the Women's Society of Cyberjutsu (WSC) Cybersecurity Workshop hosted from our Washington, DC location. This is a hands-on, practical workshop where you will put into practice those things you may have read or covered in a class. This is also a great way to keep your skills fresh if you’re a veteran.

Every workshop addresses beginner and advanced topic material. Beginners are encouraged to watch and learn as much as possible even though you may not have a clue. Exposure to new tools and techniques by watching will advance your learning process a lot quicker than trying to learn on your own. You will get to ask questions and see how it's done in the real world. Advanced attendees are encouraged to share and help answer "noob" questions as much as possible so everyone can learn from them.


Network traffic analysis looks at communication patterns between hosts on a network. It's the process of intercepting and examining packets in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted and cannot be decrypted. Network traffic analysis can be used as an attacker tool or used as a defensive technique to identify anomalies in traffic patterns.

This workshop on network traffic analysis will give you an understanding of what different types of captured traffic look like and how they can be dissected for further investigation and/or creating IDS signatures. We'll use industry tools to carve out data from network packets as well as write signatures for detection devices. Finally, we'll look at recovering passwords hidden in zip files that need to be cracked.

We are pleased to have Terrence Kimbrough as our presenter. Terrence is a top cyber-security professional in the area of traffic analysis. After his 15 year span in the Marine Corp as a Computer Defense Specialist, he serves in the same capacity as a Reservist. He ventured into the civilian world and performed a number of Blue and Red team activities and has worked for such agencies as U.S. CyberComm and other Intelligence Community (IC) agencies. His insight has been incorporated into DoD policy and provided the foundations to multiple areas of network defense. His current assignment working for a Computer Network Defense Service Provider (CDNSP) gives him a platform to implement the tools and techniques of traffic analysis at a granular level.


  • You must bring your own laptop.
  • Must be installed with Virtualbox.
  • Download the Backtrack virtual machine here and extract. Download version 5R3, Gnome, 32bit, VMware. There are issues with the 64bit version of 5R3, so download 5R2. If you've downloaded/installed Backtrack from a previous workshop, that can be used.
  • You'll receive a link by email for the Windows image. Download and import into Virtualbox. This file is 600MB and will take some time to download.
  • Instructions will be provided by email for the above.


  • Knowledge of basic networking and IT.
  • Good attitude, willingness to learn and share.

Remote Participation:

If you are attending remotely you must register on the website. Once registered, you’ll receive the meeting participation info by email the day of the workshop. Please have a working webcam/mic. Expect to join 15-30 minutes prior to test your technical configurations.


Onsite - $20, Remote - $5

We only have room for 24 onsite so register early.

Refund Policy:

Refunds are offered if:

  • The workshop is cancelled
  • You cancel at least 1 day before the workshop; by 1000am Friday (3/1) morning

Use front door. POC:[masked]

Earn CPE's towards your certification

Food & beverages are provided

Free Parking

Join or login to comment.

  • Emme B.

    The Network Analysis workshop was awesome. Instructor was well informed, encouraging and has a great sense of humor. As usual, overall organization was great.

    March 3, 2013

  • Kandace

    Loved the hands on! Great instructor! And thanks so much to Lisa for organizing, food, logistics, everything!

    March 3, 2013

  • Lori

    The workshop was packed with useful information and the hands on practice exercises reinforced the learning. Great instructor.

    March 2, 2013

  • Lily Y.

    Love all the hands on work.

    March 2, 2013

  • A former member
    A former member

    I just received notice I was attending. This is too late now for me to attend.

    March 2, 2013

  • A former member
    A former member

    I'm sick and will not be able to make it..

    March 1, 2013

  • Susan K.

    I will come.

    March 1, 2013

  • Traci

    Cannot make this date but would love to come to the next one. Sounds great!

    February 17, 2013

  • Tanuja

    Can I pay cash?

    February 11, 2013

Your organizer's refund policy for Cybersecurity Workshop

Refunds offered if:

  • the Meetup is cancelled
  • you can cancel at least 1 day(s) before the Meetup

Additional notes: You must cancel at least 1 day before the workshop; by 1000am Friday (3/1) morning

Payments you make go to the organizer, not to Meetup. You must make refund requests to the organizer.

Regardless of the refund policy set by the organizer, Meetup may issue refunds on an organizer's behalf if we determine that Meetup's Payment Policies have been violated.

People in this
Meetup are also in:

Sign up

Meetup members, Log in

By clicking "Sign up" or "Sign up using Facebook", you confirm that you accept our Terms of Service & Privacy Policy