Forensic investigators are often interested in the communications sent and received by targeted systems. They may not have access to the system itself or may simply want to get a complete profile of a suspect's communications. That's where network forensics come into play. In this video, learn network forensic analysis techniques as well as the use of big data analysis in forensic investigations.
- [Narrator] Forensic investigators are also…often interested in the communications sent and received…by targeted systems over a network.…They may not have access to the system itself…or may simply want to get a complete picture…of a suspect's communications.…That's where network forensics come into play.…Network transmissions are digital, consisting…of ones and zeros sent across some form of network media.…Ethernet networks send electrical impulses over copper wire.…
Fiber-optic networks use pulses of light…transmitted over strands of glass.…Wireless networks use radio waves…to send digital bits through the air.…Whatever media is used, anyone with access to that media…can capture those pulses as they travel.…Copper and fiber-optic cables may be tapped.…Wireless radio signals may be intercepted.…Switches and routers can be compromised.…An attacker might use these techniques…to surreptitiously eavesdrop on network communications.…
Forensic analysts may use the same tools…to monitor suspicious network traffic.…The most comprehensive way to capture network information…
- Building an incident response program
- Escalation and notification
- eDiscovery process
- Conducting investigations
- System and file forensics
- Reporting and documenting incidents
- Business continuity planning
- Validating backups
- Testing BC/DR plans
Skill Level Intermediate
Q: This course was updated on 06/01/2018. What changed?
A: We updated three videos, covering creating an incident response program, communications plan, and response team.