Book description
Intensively hands-on training for real-world network forensicsNetwork Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity. This book is hands-on all the way—by dissecting packets, you gain fundamental knowledge that only comes from experience. Real packet captures and log files demonstrate network traffic investigation, and the learn-by-doing approach relates the essential skills that traditional forensics investigators may not have. From network packet analysis to host artifacts to log analysis and beyond, this book emphasizes the critical techniques that bring evidence to light.
Network forensics is a growing field, and is becoming increasingly central to law enforcement as cybercrime becomes more and more sophisticated. This book provides an unprecedented level of hands-on training to give investigators the skills they need.
- Investigate packet captures to examine network communications
- Locate host-based artifacts and analyze network logs
- Understand intrusion detection systems—and let them do the legwork
- Have the right architecture and systems in place ahead of an incident
Network data is always changing, and is never saved in one place; an investigator must understand how to examine data over time, which involves specialized skills that go above and beyond memory, mobile, or data forensics. Whether you're preparing for a security certification or just seeking deeper training for a law enforcement or IT role, you can only learn so much from concept; to thoroughly understand something, you need to do it. Network Forensics provides intensive hands-on practice with direct translation to real-world application.
Table of contents
- Cover
- Title Page
- Introduction
- 1 Introduction to Network Forensics
- 2 Networking Basics
- 3 Host-Side Artifacts
- 4 Packet Capture and Analysis
- 5 Attack Types
- 6 Location Awareness
- 7 Preparing for Attacks
- 8 Intrusion Detection Systems
- 9 Using Firewall and Application Logs
- 10 Correlating Attacks
- 11 Network Scanning
- 12 Final Considerations
- End User License Agreement
Product information
- Title: Network Forensics
- Author(s):
- Release date: August 2017
- Publisher(s): Wiley
- ISBN: 9781119328285
You might also like
book
Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations
Become an effective cyber forensics investigator and gain a collection of practical, efficient techniques to get …
video
CCNA 200-301
More Than 16 Hours of Video Instruction Overview CCNA 200-301 Complete Video Course is a comprehensive …
book
Mastering Reverse Engineering
Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like …
book
Industrial Cybersecurity - Second Edition
Get up and running with industrial cybersecurity monitoring with this hands-on book, and explore ICS cybersecurity …