1. Try to capture some packets in a specific protocol, tell us how you captured them, and introduce the protocol to the class. (For example, I remotely login to the metasploitable VM using SSH and capture the traffic. I googled SSH and tell the class what SSH protocol is and why it is secure. Or, you can google a protocol you captured when you surf the internet and tell us why you pick this protocol and how this protocol functions).
2. Wireshark is ranked No.1 networking tool. Reading WireShark trace files for cybersecurity professionals is as important as reading source codes for programmers. There are excellent WireShark learning resources on the internet. Please explore the web and share the class with one interesting finding of using WireShark( for example, each year, WireShark posts sharkfest challenges https://blog.packet-foo.com/ (Links to an external site.)The tracefiles and the explanation videos posted on YouTube are a good learning resource. In addition, the Sharkfest conference presentations and learning materials from WireShark University are also excellent learning tools for cybersecurity practitioners.