Book Content
chapters • 11h56m total length
1. Introduction to Network Forensics
2. Technical Concepts and Acquiring Evidence
3. Deep Packet Inspection
4. Statistical flow analysis
5. Combating Tunneling and Encryption
6. Investigating Good, Known and the Ugly Malware
7. Investigating C2 Servers
8. Investigating and Analyzing Logs
9. WLAN Forensics
10. Evidence Segregation














