Specialized Training ยท DART Cybersecurity

Network Forensics

This module is the first defence-oriented step of the training.

About This Course

This module is the first defence-oriented step of the training. The participants will learn how to conduct basic research and investigation of suspicious network traffic anomalies and network logs.

Programme Curriculum
1
Network Forensics
โ–ผ
  • Network analysis tools
  • Protocol forensics
  • Planning and Intrusion detection Snort
  • Host forensics
  • Analysing server logs and event logs
  • Registry analysis
  • Review access log
  • Intrusion analysis visualisation
  • Case study analysis
Course Registration
๐Ÿ”’

Registration is Currently Closed

Registration for this course is not open at the moment. Please check back later or contact us for more information.

Contact Us