Monitor and analyse network traffic to determine the source of security attacks
This course introduces the tools, techniques and processes required to undertake successful acquisition, analysis and reporting of digital artefacts recovered during a network forensic investigation.
You will critically evaluate and apply digital forensic methodology to cyber security incidents and commercial investigation, establish an audit trail, and document a digital investigation from a legal and professional perspective.
- Network forensic processes and methodologies
- Network activity reconstruction and reporting
- Packet and network traffic analysis
- Examining abnormal traffic
- Network forensic investigation methodologies
- Network Infrastructures including Windows and Linux, Network ports and services (FTP, DNS, HTTP, HTTPS etc)
- Evidence acquisition and forensic examination of network platforms
- Network traffic and packet analysis with the use of open source tools
What will you achieve?
By the end of the course, you‘ll be able to...
- Assess a scenario and apply an appropriate digital forensic methodology
- Explore digital artefacts for evidence, document evidence in a methodical fashion and report forensic findings in accordance with Association of Chief Police Officers (ACPO) principles (2012) relevant to corporate business and organisational structures
Who is the course for?
This course is for students with an interest in digital forensics.
Please note that the staff described in the ‘Who will you learn with?’ section below may be subject to change.