Network Forensics Examiner

The Network Forensics Examiner (NFE) course is an advanced training program designed to provide individuals with the skills and knowledge necessary to investigate, analyze, and respond to network security incidents. This course focuses on the techniques and tools used to perform network forensics, enabling participants to uncover digital evidence and understand the scope and impact of security breaches. It is ideal for cybersecurity professionals, incident responders, and anyone seeking to specialize in network forensics.The Network Forensics Examiner (NFE) course offers a comprehensive exploration of network forensics, from the fundamentals to advanced concepts. Participants will learn how to capture and analyze network traffic, identify indicators of compromise, and reconstruct events surrounding a security incident. The course combines theoretical knowledge with practical, hands-on experience, ensuring participants are well-prepared to conduct thorough network forensic investigations.

Topics

      1. Overview
      2. Concepts in Digital Evidence
      3. Section Summary
      4. Module Summary

      1. Overview
      2. Challenges Relating to Network Evidence
      3. Section Summary
      4. Module Summary

      1. Overview
      2. OSCAR Methodology
      3. Section Summary
      4. Module Summary

      1. Overview
      2. Sources of Network-Based Evidence
      3. Section Summary
      4. Module Summary

      1. Background
      2. History
      3. Functionality
      4. FIGURE 5-1 The OSI Model
      5. Functionality
      6. Encapsulation/De-encapsulation
      7. FIGURE 5-2 OSI Model Encapsulation
      8. Encapsulation/De-encapsulation
      9. FIGURE 5-3 OSI Model peer layer logical channels
      10. Encapsulation/De-encapsulation
      11. FIGURE 5-4 OSI Model data names
      12. Section Summary
      13. Module Summary

      1. Overview
      2. Internet Protocol Suite
      3. Section Summary
      4. Module Summary

      1. Physical Interception
      2. Section Summary
      3. Module Summary

      1. Agenda
      2. Libpcap and WinPcap
              a. LIBPCAP
              b. WINPCAP
              c. Section Summary
      3. BPF Language
                Section Summary
      4. TCPDUMP
                Section Summary
      5. WIRESHARK
                Section Summary
      6. TSHARK
                Section Summary
      7. Module Summary

      1. Agenda
      2. Common Interfaces
                Section Summary
      3. Inspection Without Access
                Section Summary
      4. Strategy
                Section Summary
      5. Module Summary

      1. Agenda
      2. Section 01
              a. Protocol Analysis
              b. Section Summary
      3. Section 02
              a. Packet Analysis
              b. Section Summary
      4. Section 03
              a. Flow Analysis
              b. Protocol Analysis
              c. Section Summary
      5. Section 04
              a. Higher-Layer Traffic Analysis
              b. Section Summary
      6. Module Summary

      1. Agenda
      2. The IEEE Layer 2 Protocol Series
      3. Section Summary
      4. Module Summary

      1. Agenda
      2. Wireless Access Points (WAPs)
      3. Section Summary
      4. Module Summary

      1. Agenda
      2. Wireless Traffic Capture and Analysis
      3. Section Summary
      4. Module Summary

      1. Agenda
      2. Common Attacks
      3. Section Summary
      4. Module Summary

      1. Agenda
      2. Investigating NIDS/NIPS and Functionality
                Section Summary
      3. NIDS/NIPS Evidence Acquisition
                Section Summary
      4. Comprehensive Packet Logging
                Section Summary
      5. Snort
                Section Summary
      6.Module Summary

      1. Agenda
      2. Sources of Logs
                Section Summary
      3. Network Log Architecture
                Section Summary
      4. Collecting and Analyzing Evidence
                Section Summary
      5. Module Summary

      1. Agenda
      2. Storage Media
                Section Summary
      3. Switches
                Section Summary
      4. Routers
                Section Summary
      5. Firewalls
                Section Summary
      6.Module Summary

      1. Agenda
      2. Web Proxy Functionality
                Section Summary
      3. Web Proxy Evidence
                Section Summary
      4. Web Proxy Analysis
                Section Summary
      5. Encrypted Web Traffic
                Section Summary
      6.Module Summary

      1. Agenda
      2. Tunneling for Functionality
                Section Summary
      3. Tunneling for Confidentiality
                Section Summary
      4. Covert Tunneling
                Section Summary
      5. Module Summary

      1. Trends in Malware Evolution
      2. Section Summary
      3. Module Summary

Description

Discover the art of network forensics and unlock the secrets of network security! In this 20-module course, you’ll learn how to:

  • Detect and analyze network threat
  • Collect and interpret digital evidence
  • Master network protocols and tools
  • Develop skills to take on the role of a Network Forensics Examiner

Perfect for students, freshers, and professionals looking to boost their career in cybersecurity!

Send message
Hello 👋
Can we help you?