Skip navigation

Network forensics

Network forensics: CISSP Cert Prep: 7 Security Operations (2015)
Network forensics: CISSP Cert Prep: 7 Security Operations (2015)

Forensic investigators are also often interested in the communications sent and received by targeted systems. They may not have access to the system itself or may simply want to get a complete profile of a suspect's communications. That's where network forensics come into play. In this video, you will learn network forensic analysis techniques as well as the use of Big Data analysis in forensic investigations.

Resume Transcript Auto-Scroll
Skill Level Advanced
1h 47m
Show More Show Less
Skills covered in this course
Security IT CISSP

Continue Assessment

You started this assessment previously and didn't complete it. You can pick up where you left off, or start over.

Start My Free Month

Start your free month on LinkedIn Learning, which now features 100% of courses. Develop in-demand skills with access to thousands of expert-led courses on business, tech and creative topics.

Start My Free Month