Enumerating the Network Infrastructure as a Forensics Analyst
This course will teach you how to apply your theoretical knowledge of networking to both real time and post incident forensic analysis of network based data.
Cyber crimes are a continual threat to any network, and having a strategy to prevent, protect and pursue is increasingly important. In this course, Enumerating the Network Infrastructure as a Forensics Analyst, you’ll learn how to apply the theoretical knowledge of TCP/IP and network-based protocols and devices to assist in the collection, analysis, and dissemination of network-based material and evidence as part of a forensic investigation. First, you’ll explore the key elements of TCP/IP and how they apply within the world of forensic investigation. Next, you’ll discover how your knowledge of physical and logical networking can assist you in finding material quickly and efficiently. Finally, you’ll learn how to analyze network-based data and material to draw confident conclusions to events and incidents which may have occurred. When you’re finished with this course, you’ll have the skills and knowledge of enumerating the network infrastructure needed to collect, collate, and forensically analyze material from a wide range of sources which will assist you in producing evidential reports, fast time support to interview and supporting ongoing investigation.
Author Name: Phil Chapman
Author Description:
Phil Chapman is a senior instructor. He is responsible for the delivery of a range of courses including official Microsoft, CompTIA, EC Council and BCS official certifications. He is also the subject matter expert and project lead for the bespoke Law Enforcement Cyber Security training packages which are delivered to UK Law Enforcement agencies and forces. He holds a variety of IT Technical and Security qualifications across many fields. Phil spent 23 years in the Royal Air Force as an Intellige… more
Table of Contents
- Course Overview
1min - Applying Physical Networking Concepts to a Forensic Investigation
46mins - Defining Key Network Protocols for Supporting an Investigation
30mins - Securing the Infrastructure
49mins - Comparing Workgroups and Domains and How They Can Affect an Investigation
28mins - Understanding Wireless Networks
19mins
There are no reviews yet.