Book Content
chapters • 9h8m total length
1. Becoming Network 007s
2. Laying Hands on Evidence
3. Capturing & Analyzing Data Packets
4. Going Wireless
5. Catching Intruders in the Network
6. Connecting the Dots Event Logs
7. Proxies, Firewalls and Routers
8. Smuggling Forbidden Protocols Network Tunneling
9. Understanding Malware Forensics
10. Closing the Deal Solving the Case














