What you'll learn
- Be able to conduct network forensics investigations
- Be able to use log files in network forensics investigations
- Be able to read Snort log files for network forensics investigations
- Be able to understand how an attacker attacks a system
Requirements
- Have a basic understanding of the network
- Have a basic understanding of computer forensics
- Have a basic understanding of Linux operating systems
Description
With the rise of data breaches, it is important for those interested in the information security field to understand how to identify malicious attacks in network files along with system log files. Unlike computer and mobile forensics, the evidence in network forensics can be easily modified and harder to be admissible in court. Therefore, this class briefly explains the importance of log files and goes into hands-on exercises and scenarios. This class focuses on network forensics and incident response.
Who this course is for:
- Digital forensic investigators, private investigators, network engineers, and anyone interested in network forensics
Course content
- Preview00:49
Instructor
I am a Certified Computer Examiner and an Offensive Security Certified Professional (OSCP) along with expertise in the following: Penetration Testing, Intrusion Detection, Digital Forensics, Networking, Microsoldering, and Data Recovery. I have a Masters of Science in Information Security, EDS, Master of Arts in Teaching and a Bachelors of Arts in Journalism degree. I am part of the HTCIA (High Technology Crime Investigation Association) along with the ISSA (Information System Security Association).