Network Forensics

by Hacker Academy Claim Listing

Network forensics is a sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Hacker Academy Logo

img Duration

4 Days

Course Details

Network forensics is a sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection. 

Unlike other areas of digital forensics, network investigations deal with volatile and dynamic information. Network traffic is transmitted and then lost, so network forensics is often a pro-active investigation.

Our Network Forensics service is designed to equip cybersecurity professionals and IT teams with the skills and knowledge to conduct in-depth investigations, analyse network traffic, and uncover potential security breaches. 

Our service focuses on empowering your team with advanced techniques and methodologies to gather critical digital evidence, understand attack vectors, and reconstruct the sequence of events surrounding a cybersecurity incident.

 

Participants Will Able To Learn:

  • How to extract files from network packet captures and, how to analyse these files for.
  • How to use NetFlow data to identify relevant past network occurrences.
  • How to include log data into a comprehensive analytic process, filling knowledge gaps.
  • How attackers leverage man-in-the-middle tools to intercept seemingly secure communications.

 

Who Should Attend?

  • All employees who want to know how to detect, investigate, repair, and recover the compromised systems at the end points of the organization with data to be collected over the network. Especially for:
  • Information Security Professionals
  • SOC Analysts
  • Incident Response Team Members
  • Blue Team Members

 

Course Syllabus:

  • Basic Network Forensics Tools:
  • tcpdump
  • pcap file format
  • Berkeley Packet Filter (BPF)
  • Data reduction
  • Useful command-line parameters
  • Wireshark
  • User interface
  • Display filters
  • Useful features for network forensic analysis
  • Network Evidence Acquisition
  • full-packet capture
  • Logs
  • NetFlow
  • Capture devices:
  • Switches
  • taps
  • Layer 7 sources
  • NetFlow
  • Hypertext Transfer Protocol (HTTP)
  • Request/response dissection
  • Useful HTTP fields
  • HTTP tracking cookies
  • Log formats
  • Expanded mod_forensic logging
  • Domain Name Service (DNS):
  • Tunnelling
  • Logging methods
  • Firewall, Intrusion Detection System, and Network Security Monitoring Logs
  • Firewalls
  • Families of firewall solutions
  • Syntax and log formats
  • Intrusion Detection Systems (IDS) and Network Security Monitoring (NSM) Platforms
  • Rules and signatures
  • Families of IDS and NSM solutions
  • Zeek NSM
  • Basics and use cases
  • Logging
  • Signature engine
  • Logging Protocol and Aggregation
  • Syslog
  • Microsoft Eventing
  • Log Data Collection, Aggregation, and Analysis
  • SOF-ELK Platform
  • Basics and pros/cons of the Elastic stack
  • NetFlow Collection and Analysis
  • NetFlow
  • NetFlow artefacts useful for examining encrypted traffic
  • Open-Source Flow Tools
  • Using open-source tool sets to examine NetFlow data
  • SiLK
  • nfcapd, nfpcapd, and nfdump
  • SOF-ELK: NetFlow ingestion and dashboards
  • SSL/TLS
  • Encoding algorithms
  • Encryption algorithms
  • Symmetric & Asymmetric
  • Profiling SSL/TLS connections with useful negotiation fields
  • and more
  • London Branch

    King’s Cross St. Pancras Hamilton House, London

Check out more Computer Forensics courses in UK

South And City College Birmingham Logo

IT Systems Support, Networking & Cyber Security

This course is for you if you want a career or an apprenticeship in the IT and telecoms sectors to learn, practise and develop skills for a variety of employment roles such as: cyber security technician, network manager, first and second line support technicians and infrastructure technicians.

by South And City College Birmingham [Claim Listing ]
Training Express Logo

IT Security Basics

The IT Security Basics Course teaches you everything on the topic thoroughly from scratch, so you can achieve a professional certificate for free to showcase your achievements in professional life.

by Training Express [Claim Listing ]
Net Security Training Logo

CCSP (Certified Cloud Security Professional)

On this accelerated Certified Cloud Security Professional (CCSP) course you’ll get the cloud security skills you need to manage cloud environments and purchased cloud services.

by Net Security Training [Claim Listing ]
Nottingham City Council Logo

Certificate in Information Security Management Principles (Includes Online Exam Voucher)

Certificate in Information Security Management Principles (includes online exam voucher) course is offered by Nottingham City Council

by Nottingham City Council [Claim Listing ]
EZ Training Logo

Cyber Security Overview

Modern businesses demand IT systems and data to always be available from any device or location, meaning protection against cyber-attacks is a must. Cyber Security and IT Security are also increasingly linked to business risk, compliance and process.

by EZ Training [Claim Listing ]

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy