April 2023
Intermediate to advanced
469 pages
10h 7m
English
Now that we know how to perform the requirements for our packet captures to include the different parameters for the communications as well as the ability to set filters on the network traffic we capture, it is time to turn our attention to the different protocols that are part of any network investigation from analysis of intrusions all the way up to collection of forensics evidence. When you think of it, all that we do on the Internet, none of this would be possible without the network protocols that drive our ...