Network Forensics (2024)

  • Category Other
  • Type Tutorials
  • Language English
  • Total size 279.8 MB
  • Uploaded By freecoursewb
  • Downloads 551
  • Last checked 4 days ago
  • Date uploaded 1 year ago
  • Seeders 20
  • Leechers 0

Infohash : D5F3C35EA39AF949AB40C83955C3E187750860C5



Network Forensics (2024)

https://FreeCourseWeb.com

Released 11/2024
With Jungwoo Ryoo
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Skill level: Intermediate | Genre: eLearning | Language: English + subtitle | Duration: 1h 59m 37s | Size: 280 MB

Get a comprehensive look at network forensics. Learn how to prepare for network forensics investigations, investigate network events, and examine network traffic

Course details
Network forensics is used to find legal evidence in network devices. This course covers all the major concepts and tools of this growing (and exciting) technical field. Instructor Jungwoo Ryoo reviews the basics: the goals of network forensics, the types of investigations it's used for, a network forensic investigator's typical toolset, and the legal implications of this type of work. Then, he'll show how to prepare for an investigation; acquire network logs and investigate network events; collect and investigate network traffic; investigate web attacks; and create a report of your findings. He uses a combination of open-source and commercial software, so you'll be able to uncover the information you need with the tools that are in your budget.

Files:

[ FreeCourseWeb.com ] Network Forensics (2024)
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 01 - Introduction
    • 01 - Learning network forensics.mp4 (4.3 MB)
    • 01 - Learning network forensics.srt (1.2 KB)
    • 02 - What you should know.mp4 (6.5 MB)
    • 02 - What you should know.srt (2.1 KB)
    02 - 1. Understanding Network Forensics
    • 01 - Goals of network forensics.mp4 (6.9 MB)
    • 01 - Goals of network forensics.srt (4.2 KB)
    • 02 - Tools.mp4 (10.9 MB)
    • 02 - Tools.srt (5.3 KB)
    • 03 - Legal implications.mp4 (8.1 MB)
    • 03 - Legal implications.srt (4.8 KB)
    • 04 - Current and future trends.mp4 (6.4 MB)
    • 04 - Current and future trends.srt (4.0 KB)
    • 05 - Anti-network forensics techniques.mp4 (7.4 MB)
    • 05 - Anti-network forensics techniques.srt (4.3 KB)
    • 06 - Challenge Acquiring additional information with Nmap.mp4 (861.4 KB)
    • 06 - Challenge Acquiring additional information with Nmap.srt (0.6 KB)
    • 07 - Solution Acquiring additional information with Nmap.mp4 (2.6 MB)
    • 07 - Solution Acquiring additional information with Nmap.srt (0.8 KB)
    03 - 2. Preparing for a Network Forensics Investigation
    • 01 - Network forensics investigation hardware.mp4 (6.6 MB)
    • 01 - Network forensics investigation hardware.srt (3.9 KB)
    • 02 - Network forensics investigation software.mp4 (6.8 MB)
    • 02 - Network forensics investigation software.srt (3.4 KB)
    • 03 - Understanding computer networking.mp4 (5.2 MB)
    • 03 - Understanding computer networking.srt (3.3 KB)
    • 04 - Understanding networking devices.mp4 (6.6 MB)
    • 04 - Understanding networking devices.srt (4.3 KB)
    • 05 - Understanding network data sources.mp4 (6.9 MB)
    • 05 - Understanding network data sources.srt (3.9 KB)
    • 06 - Challenge Wireshark filtering.mp4 (2.8 MB)
    • 06 - Challenge Wireshark filtering.srt (0.9 KB)
    • 07 - Solution Wireshark filtering.mp4 (1.4 MB)
    • 07 - Solution Wireshark filtering.srt (0.4 KB)
    04 - 3. Investigating Network Events
    • 01 - Network logs.mp4 (8.1 MB)
    • 01 - Network logs.srt (4.4 KB)
    • 02 - Intrusion and security events.mp4 (11.7 MB)
    • 02 - Intrusion and security events.srt (3.9 KB)
    • 03 - Network logs as evidence.mp4 (6.9 MB)
    • 03 - Network logs as evidence.srt (4.8 KB)
    • 04 - Network logs and compliance.mp4 (6.5 MB)
    • 04 - Network logs and compliance.srt (4.7 KB)
    • 05 - Audit logs.mp4 (8.8 MB)
    • 05 - Audit logs.srt (3.6 KB)
    • 06 - Firewall logs.mp4 (9.0 MB)
    • 06 - Firewall logs.srt (5.2 KB)
    • 07 - syslog.mp4 (1.1 MB)
    • 07 - syslog.srt (0.7 KB)
    • 08 - syslog-ng.mp4 (2.9 MB)
    • 08 - syslog-ng.srt (1.8 KB)
    • 09 - Kiwi Syslog Server.mp4 (1.1 MB)
    • 09 - Kiwi Syslog Server.srt (0.5 KB)
    • 10 - Microsoft Log Parser.mp4 (4.9 MB)
    • 10 - Microsoft Log Parser.srt (1.8 KB)
    05 - 4. Investigating Network Traffic
    • 01 - Fundamentals.mp4 (4.8 MB)
    • 01 - Fundamentals.srt (2.8 KB)
    • 02 - Network models.mp4 (6.5 MB)
    • 02 - Network models.srt (3.9 KB)
    • 03 - Subnets, subnet ID, and subnet mask.mp4 (6.8 MB)
    • 03 - Subnets, subnet ID, and subnet mask.srt (4.3 KB)
    • 04 - Protocol analysis.mp4 (9.2 MB)
    • 04 - Protocol analysis.srt (4.8 KB)
    • 05 - ARP.mp4 (5.6 MB)
    • 05 - ARP.srt (3.7 KB)
    • 06 - ARP poisoning.mp4 (2.6 MB)
    • 06 - ARP poisoning.srt (1.8 KB)
    • 07 - DNS.mp4 (5.8 MB)
    • 07 - DNS.srt (3.3 KB)
    • 08 - DNS poisoning.mp4 (7.2 MB)
    • 08 - DNS poisoning.srt (3.0 KB)
    06 - 5. Network Forensics Tools
    • 01 - tcpdump and WinDump.mp4 (7.0 MB)
    • 01 - tcpdump and WinDump.srt (2.8 KB)
    • 02 - tcpdump and WinDump hands-on.mp4 (13.8 MB)
    • 02 - tcpdump and WinDump hands-on.srt (6.4 KB)
    • 03 - Wireshark.mp4 (5.0 MB)
    • 03 - Wireshark.srt (3.0 KB)
    • 04 - Wireshark hands-on.mp4 (9.6 MB)
    • 04 - Wireshark hands-on.srt (3.9 KB)
    • 05 - HTTP proxies.mp4 (7.0 MB)
    • 05 - HTTP proxies.srt (4.1 KB)
    • 06 - HTTP proxies hands-on.mp4 (19.9 MB)
    • 06 - HTTP proxies hands-on.srt (6.8 KB)
    • 07 - Splunk.mp4 (5.3 MB)
    • 07 - Splunk.srt (2.8 KB)
    • 08 - Splunk hands-on.mp4 (9.2 MB)
    • 08 - Splunk hands-on.srt (4.9 KB)
    07 - Conclusion
    • 01 - Next steps.mp4 (3.1 MB)
    • 01 - Next steps.srt (1.0 KB)
    • Bonus Resources.txt (0.4 KB)

There are currently no comments. Feel free to leave one :)

Code:

  • udp://tracker.torrent.eu.org:451/announce
  • udp://tracker.tiny-vps.com:6969/announce
  • http://tracker.foreverpirates.co:80/announce
  • udp://tracker.cyberia.is:6969/announce
  • udp://exodus.desync.com:6969/announce
  • udp://explodie.org:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://9.rarbg.to:2780/announce
  • udp://tracker.internetwarriors.net:1337/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://open.stealth.si:80/announce
  • udp://9.rarbg.to:2900/announce
  • udp://9.rarbg.me:2720/announce
  • udp://opentor.org:2710/announce
REVERSE-PROXY 🔄 RP (success) | 1100ms 📄 torrent 🕐 18 Jan 2026, 11:20:30 pm IST ⏰ 12 Feb 2026, 11:20:30 pm IST ✅ Valid for 24d 23h 🔄 Wait 10m