Additional Information

Additional Information
  • Home

Account Navigation

Account Navigation

Currency - All prices are in AUD

Currency - All prices are in AUD
 Loading... Please wait...
  • Call us on 877-SOLARTECH
  • My Account
Solartech

CNFE - Network Forensics Examiner

$3,500.00

CNFE - Network Forensics Examiner

$3,500.00
Quantity:
Share

Product Description

COURSE OVERVIEW

The Certified Network Forensics Examiner was created when a U.S. Government Agency contracted us to train their team on advanced forensics in computer networks. The C)NFE 4 day course will take your digital forensic skill set to the next level by navigating through over twenty modules of network forensic topics and providing you with hands-on, practical experience through our lab exercises that walk you through real-world situations that are solved with investigation and recovery of data in networks.

With the skill set of a C)NFE, students can understand exactly what is going on in a network to ensure its proper use by those entrusted with access. Every organization can benefit by employing a C)NFE to audit their network; everyone deserves to know how their resources are being used.

UPON COMPLETION

Students will:

• Have knowledge to perform network forensic examinations.
• Have knowledge to accurately report on their findings from examinations
• Be ready to sit for the C)NFE Exam

PREREQUISITES

C)DFE: Digital Forensics Examiner
• OR Equivalent Experience

WHO SHOULD ATTEND

• Forensic Auditors
• IT Auditors
• Law Enforcement
• IT Professionals

COURSE CONTENT

Module 1 -Digital Evidence Concepts

  • Overview 
  • Concepts in Digital Evidence 
  • Section Summary 
  • Module Summary

Module 2 -Network Evidence Challenges

  • Overview 
  • Challenges Relating to Network Evidence 
  • Section Summary 
  • Module Summary

Module 3 - Network Forensics Investigative

  • Methodology 
  • Overview 
  • OSCAR Methodology 
  • Section Summary 
  • Module Summary

Module 4 - Network-Based Evidence

  • Overview 
  • Sources of Network-Based Evidence 
  • Section Summary 
  • Module Summary

Module 5 - Network Principles

  • Background 
  • History 
  • Functionality 
  • FIGURE 5-1 The OSI Model 
  • Functionality 
  • Encapsulation/De-encapsulation 
  • FIGURE 5-2 OSI Model Encapsulation 
  • Encapsulation/De-encapsulation 
  • FIGURE 5-3 OSI Model peer layer logical channels 
  • Encapsulation/De-encapsulation 
  • FIGURE 5-4 OSI Model data names 
  • Section Summary 
  • Module Summary

Module 6 - Internet Protocol Suite

  • Overview 
  • Internet Protocol Suite 
  • Section Summary 
  • Module Summary

Module 7 - Physical Interception

  • Physical Interception 
  • Section Summary 
  • Module Summary

Module 8 - Traffic Acquisition Software

  • Agenda 
  • Libpcap and WinPcap 
  • LIBPCAP 
  • WINPCAP 
  • Section Summary 
  • BPF Language 
  • Section Summary 
  • TCPDUMP 
  • Section Summary 
  • WIRESHARK 
  • Section Summary 
  • TSHARK 
  • Section Summary 
  • Module Summary

Module 9 - Live Acquisition

  • Agenda 
  • Common Interfaces 
  • Section Summary 
  • Inspection Without Access 
  • Section Summary 
  • Strategy 
  • Section Summary 
  • Module Summary

Module 10 - Analysis

  • Agenda 
  • Protocol Analysis 
  • Section Summary 
  • Section 02 
  • Packet Analysis 
  • Section Summary 
  • Section 03 
  • Flow Analysis 
  • Protocol Analysis 
  • Section Summary 
  • Section 04 
  • Higher-Layer Traffic Analysis 
  • Section Summary 
  • Module Summary

Module 11 - Layer 2 Protocol

  • Agenda 
  • The IEEE Layer 2 Protocol Series 
  • Section Summary 
  • Module Summary

Module 12- Wireless Access Points

  • Agenda 
  • Wireless Access Points (WAPs) 
  • Section Summary 
  • Module Summary

Module 13 - Wireless Capture Traffic and Analysis

  • Agenda 
  • Wireless Traffic Capture and Analysis 
  • Section Summary 
  • Module Summary

Module 14 - Wireless Attacks

  • Agenda 
  • Common Attacks 
  • Section Summary 
  • Module Summary

Module 15 - NIDS_Snort

  • Agenda 
  • Investigating NIDS/NIPS 
  • and Functionality 
  • Section Summary 
  • NIDS/NIPS Evidence Acquisition 
  • Section Summary 
  • Comprehensive Packet Logging 
  • Section Summary 
  • Snort 
  • Section Summary 
  • Module Summary

Module 16 - Centralized Logging and Syslog

  • Agenda 
  • Sources of Logs 
  • Section Summary 
  • Network Log Architecture 
  • Section Summary 
  • Collecting and Analyzing Evidence 
  • Section Summary 
  • Module Summary

Module 17 - Investigating Network Devices

  • Agenda 
  • Storage Media 
  • Section Summary 
  • Switches 
  • Section Summary 
  • Routers 
  • Section Summary 
  • Firewalls 
  • Section Summary 
  • Module Summary

Module 18 - Web Proxies and Encryption

  • Agenda 
  • Web Proxy Functionality 
  • Section Summary 
  • Web Proxy Evidence 
  • Section Summary 
  • Web Proxy Analysis 
  • Section Summary 
  • Encrypted Web Traffic 
  • Section Summary 
  • Module Summary

Module 19 - Network Tunneling

  • Agenda 
  • Tunneling for Functionality 
  • Section Summary 
  • Tunneling for Confidentiality 
  • Section Summary 
  • Covert Tunneling 
  • Section Summary 
  • Module Summary

Module 20 - Malware Forensics

  • Trends in Malware Evolution 
  • Section Summary 
  • Module Summary

Product Reviews

Find Similar Products by Category