Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS AWS Certified Developer - Associate CompTIA Security+
Photoshop Graphic Design Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Mindfulness Personal Development Personal Transformation Meditation Life Purpose Coaching Neuroscience
Web Development JavaScript React CSS Angular PHP Node.Js WordPress Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee

This course includes:

  • 2.5 hours on-demand video
  • 7 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Assignments
IT & Software Network & Security Digital Forensics

Digital Forensic Series: Network Forensics

Network Forensics
Rating: 3.9 out of 53.9 (23 ratings)
154 students
Created by Terrica Ashoor
Last updated 2/2019
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Be able to conduct network forensics investigations
  • Be able to use log files in network forensics investigations
  • Be able to read Snort log files for network forensics investigations
  • Be able to understand how an attacker attacks a system

Requirements

  • Have a basic understanding of the network
  • Have a basic understanding of computer forensics
  • Have a basic understanding of Linux operating systems

Description

With the rise of data breaches, it is important for those interested in the information security field to understand how to identify malicious attacks in network files along with system log files.  Unlike computer and mobile forensics, the evidence in network forensics can be easily modified and harder to be admissible in court. Therefore, this class briefly explains the importance of log files and goes into hands-on exercises and scenarios. This class focuses on network forensics and incident response.

Who this course is for:

  • Digital forensic investigators, private investigators, network engineers, and anyone interested in network forensics

Course content

6 sections • 21 lectures • 2h 40m total length

  • Preview00:49

  • Preview06:25
  • Preview02:19
  • Preview02:08
  • Lab- Locating Windows Event Logs
    04:15
  • Lab- Locating Logs in Macintosh
    01:39
  • Lab- Locating Logs in Linux
    01:13

  • OSI Model
    05:54
  • Wireshark
    02:24
  • Lab- Wireshark
    11:10
  • Lab 2 - Wireshark Scenario
    16:26
  • Lab 3- Wireshark Scenario
    25:59
  • Wireshark Practice
    1 question
  • TCPdump
    00:29
  • Lab- TCPdump
    09:24

  • HIDS AND NIDS
    01:47
  • SNORT
    03:15
  • SNORT - Lab
    10:00
  • Reading SNORT LOGS
    5 questions

  • Scenario - Company XYZ
    01:26
  • First Attack - John's Computer
    31:18
  • Taking a Closer Look
    6 questions
  • Second Attack - Bob's Computer
    15:05
  • Examining Evidence
    07:00

  • Nitroba Scenario
    3 questions

Instructor

Terrica Ashoor
Digital Forensic Examiner at ID Forensic LLC
Terrica Ashoor
  • 3.9 Instructor Rating
  • 465 Reviews
  • 4,651 Students
  • 5 Courses

I am a Certified Computer Examiner and an  Offensive Security Certified Professional (OSCP) along with expertise in the following: Penetration Testing, Intrusion Detection, Digital Forensics, Networking, Microsoldering, and Data Recovery. I have a  Masters of Science in Information Security, EDS, Master of Arts in Teaching and a Bachelors of Arts in Journalism degree. I am part of the HTCIA (High Technology Crime Investigation Association) along with the ISSA (Information System Security Association). 

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.