Specialized Training ยท DART Cybersecurity
Network Forensics
This module is the first defence-oriented step of the training.
About This Course
This module is the first defence-oriented step of the training. The participants will learn how to conduct basic research and investigation of suspicious network traffic anomalies and network logs.
Programme Curriculum
1
Network Forensics
โผ
- Network analysis tools
- Protocol forensics
- Planning and Intrusion detection Snort
- Host forensics
- Analysing server logs and event logs
- Registry analysis
- Review access log
- Intrusion analysis visualisation
- Case study analysis
Course Registration
Registration is Currently Closed
Registration for this course is not open at the moment. Please check back later or contact us for more information.
Contact Us