Network Forensics
Upskilling Course, 40 Academic Hours
Improve Capabilities, Skills and Knowledge on Cybersecurity Investigations and Network Forensics
- Level: Advanced
Designed to elevate the capabilities, skills, and knowledge of students in cybersecurity investigations and network forensics, this course targets individuals eager to deepen their understanding and proficiency.
By enrolling in this course, you'll gain experience with breakthrough methods, procedures, technology, and tools for conducting investigations that are more efficient, accurate, and beneficial.
Who Is This Course For?
- SOC IR and forensics teams
- Law enforcement specialists
- Cybersecurity practitioners
- Cyber investigators
- Cyber Threat Intelligence Analysts
- Cyber Forensic analysts
- Network defenders
- IT network engineers
- IT operations
- STEM Master’s students
Prerequisite
- Several years of experience in security and IT
Learning Objectives
- Learn about procedures, processes, and workflows
- Find, collect, and perform a forensic investigation
- Extract forensic artifacts from network communications (i.e. packet captures) as part of an incident response investigation.
- Become familiar with the forensic aspects of common network protocols (i.e. SSL/TLS stripping)
- Become familiar with TTPs (tools, techniques and procedures) relevant to network investigations (i.e. leveraging Wireshark functionalities)
What You'll Get...
- Course presentation as a PDF file
- Cheat sheets and useful documentation
- “Swiss Army Knife” - 3Gb of IR tools
- 22 hours of practical learning experience through hands-on activities
- A Wawiwa certificate upon successful completion of the course
Professional Supervisor and Instructors
Supervising all Wawiwa Cyber courses is Mr. Nadav Nachmias, Head of Cybersecurity Programs at Wawiwa.
The course instructors are cybersecurity professionals with hands-on experience as well as training skills. The technical level of the course can be adjusted according to the audience.
Nadav Nachmias
Head of Cybersecurity Programs
Nadav is a Cybersecurity Specialist with over 15 years of experience, focusing on Cybersecurity strategies, architecture, and workforce empowerment. His practical experience made it intuitive for him to develop diverse training programs and materials in several Cybersecurity fields (including Cybersecurity Management, Incident Handling and Response, and Cyber Forensics).
What Do Graduates Have to Say?
Course Syllabus
Module 1: Getting Deep into the Wire
- The Proxy in the Middle
- Network Analysis
- Network Evidence
- Observe the Whole Picture
Module 2: Networking Protocols and Logs
- HTTP Forensics
- Domain Name Services
- Network Security Monitoring
- Logging Protocols and Aggregation
Module 3: NetFlow and File Access Protocols
- NetFlow Introduction
- NetFlow Analysis
Module 4: Commercial Tools, Wireless, and Full-Packet Hunting
- Simple Mail Transfer Protocol (SMTP)
- Network Miner
- Wireless Network Analysis
- Evil Twin Attack
- Automated Tools
- Arkime
Module 5: Encryption, Protocol Reversing, OPSEC, and Intel
- Encoding, Encryption, and SSL
- MITM Attack
- Reverse Network Protocols
- Cyber Threat Intelligence (CTI)
Give your team the edge they need to succeed with our comprehensive courses, tailored to your specific needs.
Interested in more details?
We’d be happy to answer all your questions!