O'Reilly logo

CCFP Certified Cyber Forensics Professional All-in-One Exam Guide by Chuck Easttom

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

A great many cybercrimes occur over networks and often the Internet. Viruses, spyware, and Trojan horses are frequently spread over networks. Crimes such as denial of service (DoS) attacks and cyber stalking depend almost exclusively on network communications. There are other examples, ranging from someone hacking into a database to cyber terrorism. Clearly, network forensics is critical. In this chapter, you will learn the basics of network forensics.

Network Packet Analysis

The first, most fundamental thing to learn about network forensics is packet analysis. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required