• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

NetWork Forensics (2024) (1 Viewer)

Currently reading:
 NetWork Forensics (2024) (1 Viewer)

Recently searched:

mayoufi

Member
Amateur
LV
5
Joined
Oct 22, 2023
Threads
3,471
Likes
389
Awards
12
Credits
1,958©
Cash
0$
308fbc29aa606955f9c73cdf1cab2741.jpg


eleased: 11/25/2024
Duration: 1h 59m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 280 MB
Genre: eLearning | Language: English


Network forensics is used to find legal evidence in network devices. This course covers all the major concepts and tools of this growing (and exciting) technical field. Instructor Jungwoo Ryoo reviews the basics: the goals of network forensics, the types of investigations it's used for, a network forensic investigator's typical toolset, and the legal implications of this type of work. Then, he'll show how to prepare for an investigation; acquire network logs and investigate network events; collect and investigate network traffic; investigate web attacks; and create a report of your findings. He uses a combination of open-source and commercial software, so you'll be able to uncover the information you need with the tools that are in your budget.

 

Brainsomers

PRO
PRO
Member
LV
2
Joined
Apr 20, 2023
Threads
24
Likes
101
Awards
6
Credits
39,042©
Cash
0$
sdf
308fbc29aa606955f9c73cdf1cab2741.jpg


eleased: 11/25/2024
Duration: 1h 59m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 280 MB
Genre: eLearning | Language: English


Network forensics is used to find legal evidence in network devices. This course covers all the major concepts and tools of this growing (and exciting) technical field. Instructor Jungwoo Ryoo reviews the basics: the goals of network forensics, the types of investigations it's used for, a network forensic investigator's typical toolset, and the legal implications of this type of work. Then, he'll show how to prepare for an investigation; acquire network logs and investigate network events; collect and investigate network traffic; investigate web attacks; and create a report of your findings. He uses a combination of open-source and commercial software, so you'll be able to uncover the information you need with the tools that are in your budget.

* Hidden text: cannot be quoted. *
sdfsdfsfdsfd
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Recently searched:

Similar threads

Users who are viewing this thread

Top Bottom