Network Forensics
Want to learn how to detect and trace intruders on your network? In this course, you will learn to use Snort, Wireshark, Splunk, and other network tools to do just that!
Introducción
Definitions
Network Forensics Methodology
Network Forensics Strategies
Network Forensics Analisys
TCP/IP Protocol Part I
TCP/IP Protocol Part II
Traffic Analysis Part I
Traffic Analysis Part II
User-Agent
Traffic Analysis Part III
Traffic Analysis Part IV
Traffic Analysis Part V
Traffic Analysis Part VI
Snort IDS Part I
Snort IDS Part II
Splunk Part I
Splunk Part II
Wireless Traffic Analysis Part I
Wireless Traffic Analysis Part II
Introduction
Browser Fingerprinting Cookies Part I
Browser Fingerprinting Cookies Part II
Browser Fingerprinting Canvas and WebRTC
Browser Fingerprinting User Agent
Exercise Nº 1: Analyzing a Data Breach on a Web Server Part I
Exercise Nº 1: Analyzing a Data Breach on a Web Server Part II
Exercise Nº 1: Analyzing a Data Breach on a Web Server Part III
Exercise Nº 1: Analyzing a Data Breach on a Web Server Part IV
Exercise Nº 1: Analyzing a Data Breach on a Web Server Part V
Exercise Nº 1: Analyzing a Data Breach on a Web Server Part VI
Exercise Nº 2: Analyzing a Ransomware Case Part I
Exercise Nº 2: Analyzing a Ransomware Case Part II
Exercise Nº 2: Analyzing a Ransomware Case Part III
Exercise Nº 2: Analyzing a Ransomware Case Part IV
Exercise Nº 3: Analyzing a Network Trace Case Part I
Exercise Nº 3: Analyzing a Network Trace Case Part II
Exercise Nº 3: Analyzing a Network Trace Case Part III
Exercise Nº 3: Analyzing a Network Trace Case Part IV
Exercise Nº 4: Analyzing Info Stealer Case Part I
Exercise Nº 4: Analyzing Info Stealer Case Part II
Exercise Nº 4: Analyzing Info Stealer Case Part III
Exercise Nº 4: Analyzing Info Stealer Case Part IV
The most complete training about Network Forensics.