- Please login to continue
- Don't have an Alison account? Sign Up
or Sign Up For Free
Join the World’s Largest Free Learning Community
- Already have an Alison account? Log In
orThis is the name that will appear on your Certification
- Please login to continue
Turn your expertise into online courses for learners across the globe.
- Don't have a Publisher account? Sign Up
- Forgot password?
Please enter you email address and we will mail you a link to reset your password.
3
Modules
25
Topics
6-10
hours
Modules (3) Resources ()
learn about network-based evidence and how to become a certified network forensics examiner.
- Module 1
Network Forensics Protocols
Resources availableThis module will teach you some definitions and terminologies used in digital evidence. You will also study challenges in acquiring network evidence as well as the methodology used in collecting network forensic evidence. Also, you will get to understand some networking principles and explore essential network acquisition software and tools.Network Forensics Protocols - Learning Outcomes
Start TopicConcepts of Digital Evidence
Start TopicNetwork Evidence Challenges
Start TopicNetwork Forensics Investigative Methodology
Start TopicNetwork-Based Evidence
Start TopicNetwork Principles
Start TopicInternet Protocol Suite
Start TopicPhysical Interception
Start TopicTraffic Acquisition Software
Start TopicLive Acquisition
Start TopicLayer 2 Protocol
Start TopicNetwork Forensics Protocols - Lesson Summary
Start Topic - Module 2
Network Investigative Tools
Resources availableIn this module, you will learn the fundamentals and challenges of protocol analysis and wireless access points. You will also examine some wireless traffic capturing tools and software. Types of operating system logs and web proxies will be analyzed. Also, you will explore network tunnelling, malware forensics and the legality of using logs.Network Investigative Tools - Learning Outcomes
Start TopicProtocol Analysis
Start TopicWireless Access Points
Start TopicWireless Traffic Capture and Analysis
Start TopicNetwork Intrusion Detection System/Snort
Start TopicCentralized Logging and Syslog
Start TopicInvestigating Network Devices
Start TopicWeb Proxies and Encryption
Start TopicNetwork Tunneling
Start TopicMalware Forensics
Start TopicNetwork Forensics and Investigating Logs
Start TopicNetwork Investigative Tools - Lesson Summary
Start Topic course assessment: Network Forensics Examiner
- Module 3
Course assessment
Resources available