Cyber crimes are a continual threat to any network, and having a strategy to prevent, protect and pursue is increasingly important. In this course, Enumerating the Network Infrastructure as a Forensics Analyst, you’ll learn how to apply the theoretical knowledge of TCP/IP and network-based protocols and devices to assist in the collection, analysis, and dissemination of network-based material and evidence as part of a forensic investigation. First, you’ll explore the key elements of TCP/IP and how they apply within the world of forensic investigation. Next, you’ll discover how your knowledge of physical and logical networking can assist you in finding material quickly and efficiently. Finally, you’ll learn how to analyze network-based data and material to draw confident conclusions to events and incidents which may have occurred. When you’re finished with this course, you’ll have the skills and knowledge of enumerating the network infrastructure needed to collect, collate, and forensically analyze material from a wide range of sources which will assist you in producing evidential reports, fast time support to interview and supporting ongoing investigation.
Phil Chapman is a senior instructor. He is responsible for the delivery of a range of courses including official Microsoft, CompTIA, EC Council and BCS official certifications. He is also the subject matter expert and project lead for the bespoke Law Enforcement Cyber Security training packages which are delivered to UK Law Enforcement agencies and forces.
Course Overview Hello everyone. My name is Phil Chapman, and welcome to my course, Digital Forensics: Enumerating the Network Infrastructure as a Forensic Analyst. I'm a senior instructor and cybercrime project lead at Firebrand Training UK, and for the past seven years, I've been involved in training UK law enforcement officers in cybercrime pursue, protect, and prevent strategies. This course will give you an insight into using your network infrastructure knowledge into the world of forensic analysis, and you should already be familiar with some foundation networking concepts before getting started. In this course, we're going to hone our knowledge of network infrastructures and protocols to use within the world of forensic investigation and analysis. Some of the major topics that we will cover include defining key network protocols for supporting an investigation, securing the infrastructure with layers of defense, comparing workgroups and domains and how they can affect an investigation, conducting a Wi‑Fi survey and considerations about wireless networking. By the end of this course, you'll know how to apply your theoretical knowledge of networking to both real‑time and post‑incident forensic analysis of network‑based data. Before beginning this course, you should be familiar with the basic concepts of the OSI and TCP/IP models and some of the key networking protocols and devices in use on a modern network and be involved or interested in first response, incident handling, and digital forensics. I hope you'll join me in this journey to learn network forensic analysis with the Digital Forensics: Enumerating the Network Infrastructure as a Forensic Analyst course, here at Pluralsight.