• Online, Instructor-Led
  • Classroom
Course Description

In this course, you will develop the skills not only to capture suspicious data, but also to discern unusual patterns hidden within seemingly normal network traffic. You will gain a set of investigative techniques focused on the use of vendor—neutral, open source tools to provide insight

Learning Objectives

Principles of network forensics analysis and how to apply them
Configure various open source tools for network forensics analysis
Utilize tools to recognize traffic patterns associated with suspicious network behavior
Reconstruct suspicious activities such as e—mails, file transfers, or web browsing for detailed analysis and evidentiary purposes
Recognize potential network security infrastructure misconfigurations

Framework Connections