TASK 1: NMAP AND WIRESHARK Introduction In the changing field of cybersecurity, you will need to continually identify new threats to your network as evidenced in the network itself and the traffic on that network You will need to know how to run network mapping and monitoring software to find vulnerabilities and anomalies that could impact the security of your network in order