8669941660?profile=original

Network Forensics & Practical Packet Analysis

oswlj6.jpg?width=150

Workshop Duration: 2 days
Date: 4 & 5th June,2015

Price: INR 25,000

Description:

The knowledge of computer and network forensics has become essential in securing today’s network-centric computing environment. This workshop is developed to provide an introduction to the exciting and growing field of digital investigations and network forensics.

Upon completing this course, the participants are expected to:

  • Gain a set of investigative techniques focused on the use of vendor-neutral, open source tools.
  • Develop the skills to capture suspicious data.
  • Discern unusual patterns hidden within seemingly normal network traffic
  • Understand the basics of computer & network forensics
  • Get well-trained as next-generation computer crime investigators
  • Get prepared for active research at the forefront of these areas.

Throughout the course, real-world examples in conjunction with numerous hands-on exercises will provide practical forensics analysis skills.

Workshop Agenda:

  • Introduction to Network Forensic
  • Setting up The Environment/Testing Lab
  • Basic Protocol Analysis
  • Forensic Analysis of Network Attacks
  • Forensic Analysis of Web Attacks
  • Forensic Analysis of Malwares
  • Data extraction from packets
  • Network Forensic Using Xplico
  • Basic packet analysis challenges – 1, 2, 3
  • *Automated packet analysis and Network Forensic programming
  • *Writing Custom Wireshark Packet Dissector
  • *Wireless Packet Analysis
  • *Data Representation – Reporting and Stats
  • *Protocol fuzzing using Scappy
  • *Advance packet analysis challenges – 1-5

*Advance training

Candidate Requirements:

  • Familiar with TCP/IP Networking
  • Familiar with Basic Network Infrastructure Devices such as switches, routers, etc.
  • OR familiar with Basic Cyber Security Course

You need to bring:

  • Laptop (supports wifi connectivity)

Eligible Candidates:

  • This course is designed for law enforcement, corporate, government and Military.
  • This workshop is essential to information security, risk management, loss prevention, corporate security and law enforcement personnel who encounter digital evidence “on the wire” while conducting an investigation e.g. Network engineers, network security professionals, who possess basic- to intermediate-level general security and networking knowledge.
  • Also,Personnel who have working knowledge of host-based forensics analysis and want to gain expertise in the end-to-end digital forensics process can attend this training.

Benefits of attending:

  • Principles of network forensics analysis & how to apply them
  • Configure various open source tools for network forensics analysis
  • Utilize tools to recognize traffic patterns associated with suspicious network behavior
  • Reconstruct suspicious activities such as e-mails, file transfers, or web browsing for detailed analysis and evidentiary purposes
  • Recognize potential network security infrastructure misconfigurations

Set Expectations:

  • Hands on session

Takeaway:

  • Training material with numerous reference Wireshark trace files
  • DVD of networking and forensics tools
  • Library of network forensics analysis reference documents
  • Investigation Cheat sheets

Trainer: Tamaghna Basu

8669804252?profile=originalOSCP, GCIH, RHCE, CEH, ECSA, co-founder of www.weekendsecurity.org. Security Research has been his main areas of research include Web app security and network pen‐testing, exploit development, incident handling and cyber forensic. He also presented in other security conferences like C0C0N, OWASP etc.

Checkout other training

>> Cyber Forensics & Incident Response Training: Click Here

>> Application Security Testing & Web Hacking: Click Here

>>Reverse Engineering & Malware Analysis: Click Here

>>Advanced Android & iOS Hands-on Exploitation - Click here

>>Security Testing In The Cloud: Click Here

>> Decision Summit & Top 100 CISO Awards: Click Here

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform