February 2026
Intermediate to advanced
456 pages
17h 3m
English
Once you have access to the appropriate tools, you can examine either the live traffic or logs to determine if a crime has been (or is being) committed and to gather evidence about that crime.
An end-to-end investigation looks at an entire attack. It looks at how an attack starts, at the intermediate devices, and at the result of the attack. Evidence may reside on each device in the path from the attacking system to the victim. Routers, VPNs, and other devices produce logs. Network security devices, such as firewalls and intrusion detection systems (IDS), also generate logs. An IDS is software that automates the process of monitoring events occurring in a computer system or network, analyzing ...
Read now
Unlock full access