Due to Covid-19 safety restrictions PhoenixTS will temporarily be unable to provide food to our students who attend class at our Training Center; however, our Break Areas are currently open where students will find a constant supply of Coffee, Tea and Water. Students may bring their own lunch and snacks to eat in our breakrooms or at their seat in the classroom or eat out at one of the many nearby restaurants.
Course Overview
Our 5-day, instructor-led, Network Forensics Training course is directed toward IT security professionals in police and law enforcement, military and government, banking, network, and e-business. This course will teach you how to:
- Carve suspicious email attachments from packet captures
- Use flow records to track intruders
- Analyze wireless encryption-cracking attacks
- Reconstruct a suspect’s web surfing history (including cached pages) from a web proxy
- Uncover DNS-tunnels traffic
- Dissect the Operation Aurora exploit
There are no specific prerequisites for this course. However, it is highly recommended that you have either the CompTIA® Network+ or Security+ Certification before enrolling in this course.
Schedule
Network Forensics Training
date
location
price
![[image]](https://stage.phoenixts.com/wp-content/themes/phoenixts-com/assets/images/temp/image-9@2x.jpg)
Not seeing a good fit?
Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.
Learn more about custom training
Course Outline
Introduction to the Field and Background
- Introduction to Forensics
- Overview of Computer Crimes
- Lab: Applying the Daubert Standard to Forensic Evidence
- Forensics Methods and Labs
- Trends and Future Directions
Tools and Methods
- System Forensic Resources
- Lab: Documenting a Workstation Configuration Using Common Forensic Tools
- Collecting, Seizing, and Protective Evidence
- Lab: Uncovering New Digital Evidence Using Bootable Forensic Utilities
Types of Forensics
- Email Forensics
- Lab: Analyzing Images to Identify Suspicious or Modified Files
- Windows Forensics
- Recognizing the Use of Steganography in Image Files
- Linux Forensics
- Lab: Automating Email Evidence Discovery Using P2 Commander
- Macintosh Forensics
- Mobile Forensics
- Lab: Decoding an FTP Protocol Session for Forensic Evidence
- Peforming Network Analysis
- Lab: Identifying and Documenting Evidence from a Forensic Investigation
- Incident and Intrusion Response
- Lab: Conducting an Incident Response Investigation for a Suspicious Login
Due to Covid-19 safety restrictions PhoenixTS will temporarily be unable to provide food to our students who attend class at our Training Center; however, our Break Areas are currently open where students will find a constant supply of Coffee, Tea and Water. Students may bring their own lunch and snacks to eat in our breakrooms or at their seat in the classroom or eat out at one of the many nearby restaurants.