john the ripper
Students are required to complete the group research project that demonstrates their proficiency with network security technologies. You can pick any technologies, but you must understand how they work, integrate, and operate to provide Confidentiality, Integrity and Availability. The requirement is to essentially pick a security tool, test it, evaluate it and write a “how to manual”. You must get the tool to work. Remember to cite your sources.
just focus on logging and analysis using john the ripe