×
Phoenix TS

Network Forensics Training

This course teaches students how to recognize a hacker’s tracks and uncover network-based evidence.

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Course Overview

Our 5-day, instructor-led, Network Forensics Training course is directed toward IT security professionals in police and law enforcement, military and government, banking, network, and e-business. This course will teach you how to: 

  • Carve suspicious email attachments from packet captures 
  • Use flow records to track intruders 
  • Analyze wireless encryption-cracking attacks 
  • Reconstruct a suspect’s web surfing history (including cached pages) from a web proxy 
  • Uncover DNS-tunnels traffic 
  • Dissect the Operation Aurora exploit 

There are no specific prerequisites for this course. However, it is highly recommended that you have either the CompTIA® Network+ or Security+ Certification before enrolling in this course. 

Schedule

Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 301-258-8200.

[image]

Not seeing a good fit?

Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.

Contact Us

Learn more about custom training

Course Outline

Introduction to the Field and Background

  • Introduction to Forensics
  • Overview of Computer Crimes
  • Lab: Applying the Daubert Standard to Forensic Evidence
  • Forensics Methods and Labs
  • Trends and Future Directions

Tools and Methods

  • System Forensic Resources
  • Lab: Documenting a Workstation Configuration Using Common Forensic Tools
  • Collecting, Seizing, and Protective Evidence
  • Lab: Uncovering New Digital Evidence Using Bootable Forensic Utilities

Types of Forensics

  • Email Forensics
  • Lab: Analyzing Images to Identify Suspicious or Modified Files
  • Windows Forensics
  • Recognizing the Use of Steganography in Image Files
  • Linux Forensics
  • Lab: Automating Email Evidence Discovery Using P2 Commander
  • Macintosh Forensics
  • Mobile Forensics
  • Lab: Decoding an FTP Protocol Session for Forensic Evidence
  • Peforming Network Analysis
  • Lab: Identifying and Documenting Evidence from a Forensic Investigation
  • Incident and Intrusion Response
  • Lab: Conducting an Incident Response Investigation for a Suspicious Login

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Phoenix TS is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints re-garding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site: www.nasbaregistry.org

Subscribe now

Get new class alerts, promotions, and blog posts

Phoenix TS needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.

Download Course Brochure

Enter your information below to download this brochure!

Name(Required)