Hands-On Network Forensics
In the era of network attacks and malware threat, it becomes important to have skills to investigate the attack evidence and vulnerabilities prevailing in the network. This book focuses on how to acquire and analyze the evidence, write a report and use the common tools in network forensics.
Offered by
Difficulty Level
Intermediate
Completion Time
11h56m
Language
English
About Book
Who Is This Book For?
The book targets incident responders, network engineers, analysts, forensic engineers and network administrators who want to extend their knowledge from the surface to the deep levels of understanding the science behind network protocols, critical indicators in an incident and conducting a forensic search over the wire.
Hands-On Network Forensics
- About Book
- Who Is This Book For?
- Book Content
Book content
chapters • 11h56m total length
Introduction to Network Forensics
Technical Concepts and Acquiring Evidence
Deep Packet Inspection
Statistical flow analysis
Combating Tunneling and Encryption
Investigating Good, Known and the Ugly Malware
Investigating C2 Servers
Investigating and Analyzing Logs
WLAN Forensics
Evidence Segregation
Related Resources
Access Ready-to-Use Books for Free!
Get instant access to a library of pre-built books—free trial, no credit card required. Start training your team in minutes!