WiFi symbol

Cyber Security & Network Forensics Analysis

Price: € T.B.A.
Category: Network / Training, Security / Forensics
Format: Classroom, Virtual / In-house
Network Forensics Analysis encompasses the skills of capturing suspicious data and the ability to discern unusual patterns hidden within seemingly normal network traffic. This course provides the student with a set of investigate techniques focusing on the use of vendor-neutral,.. read more below
Amsterdam / In-House / Virtual
T.B.A. 2025
8.30-16-30
duration: 5 days
5-12 class size
English


Network Forensics Analysis encompasses the skills of capturing suspicious data and the ability to discern unusual patterns hidden within seemingly normal network traffic. This course provides the student with a set of investigate techniques focusing on the use of vendor-neutral, Open-Source Tools to provide insight into the following areas:

  • Forensics Analysis fundamentals and data-mining using Open-Source Network Forensics Tools
  • Network security principles including encryption technologies and defensive configurations of network infrastructure devices
  • Indication of Compromise and threat recognition for a variety of network attack and exploit scenarios, including reconnaissance techniques, intrusion and exploit methodologies, Bot-Net threat recognition as well as standard user protocol vulnerabilities including many IP related Protocols such as IPv4/v6 / TCP, DNS/DNSSec, ARP, ICMPv4/v6, and an introduction to Voice / Video over IP and Wireless Networking technologies
  • Specialized Network Forensics Analysis techniques, including suspicious data traffic reconstruction and viewing

This course is for Networking, Government, and Security personnel that need to develop advanced packet investigation techniques by analyzing evidence, both Pcap-based and Open-source Intelligence-based using Wireshark and other Open-Source Analysis tools. Successful completion of this course provides these individuals with a pathway into the field of Forensics Analysis.

Section 1: Introduction to Forensics Analysis

 

Logistics and Open-Source Tool Recommendations

 

Network Forensics Challenges – Nomenclature and Terminology

• Overview and history of Network Forensics Analysis

• Answering the critical incident response questions

• Sample Six step Network Forensics Analysis Methodology

 

Section 2: Recap: Collecting the Data – Data Capture

 

Forensic Profile Construction

 

Data Collection

• Configuring Wireshark – Standard Captures vs. Stealth and Silent Collection of Data

• New types of capture filters – Offset and String-Matching

• WiFi data collection challenges

• Bluetooth capture features

 

Section 3: Identifying and Analyzing Indicators of Compromise

 

Analyzing Conversations and Activities for Indicators of Compromise (IOC)

• Analyzing Conversations and Activities using the Expert Systems to determine unusual activity

• Determining Which Conversations Are Suspect – Analyzing Latency and Throughput to recognize suspicious traffic

 

Forensic Diagramming – A Picture is worth 1024 Words

 

What’s Normal vs. Abnormal – The Role of Baseline Files

• Building a Baseline Library – Where do I find Samples?

 

Recognizing IOCs of Intrusions

• Forensic Analysis of an Intrusion

• Scouting the Target – Network Reconnaissance and Scanning Tools

• Recognizing Scanning Signatures of standard scanning tools – NMAP, Nessus, Retina, and others

 

Bot, Botnets – Command and Control Traffic

• Recognizing Bots and Botnet activity – the key IOC’s

• Identifying, tracking, and reassembling Command and Control Traffic

 

Section 4: Introduction to Forensics Analysis of Multimedia Protocols – Voice, Video, T.38 and T.120 over IP

 

Introduction – Overview & Terminology

• Multimedia Protocols, standards, and hardware

 

Analyzer Placement & Configuration

• Where to collect the Data and Wireshark Multimedia Specific Menus

 

Overview of Multimedia Protocols

• H.323, SIP, MGCP / SCCP, Voice and Video Codec(s)

• T.38 Fax over IP and T.120 Conference over IP

 

Multimedia Reassembly and Playback

 

Indicators of Compromise – Multimedia Vulnerabilities & Exploits

 

Section 5: Introduction to Forensics Analysis of Wireless (WiFi) Traffic

 

Introduction – Overview & Terminology

• WiFi Protocols and Standards

• 802.11a / b/ g/ n/ ac

• Hardware – Antennas & Access Points

 

Analyzer Placement & Configuration

• Where to collect the Data and Wireshark WiFi Specific Menus

 

WiFi Communication – Service Sets

• BSSID, ESSID, and IBSS / Adhoc

 

WiFi MAC Layer

• Finding a Service Set and connecting to a Service Set

• Authentication / Association

• Moving Between Service Sets

• Disconnection from Service Sets

 

SoHo / Internet of Things (IoT) Technologies

• 802.15 Bluetooth, 802.16 WiMAX, Home RF, ZigBee, Infrared, ZWave and RFID

 

Indicators of Compromise – WiFi Exploitation – Security Vulnerabilities & Exploits

• Rogue Devices

• Man-in-the-Middle

• Malware / Ransomware

• Denial of Service (DoS / DDoS) Attacks

• Bots / Botnets

 

Section 6: They Hacked Me – Network Forensics Analysis – Intrusions, Exploits, Etc…

 

Overview & Terminology

 

Identifying Target Networks Vulnerabilities

• Scanning & Reconnaissance

• Tools, techniques, and scanning tool identification with Wireshark

 

You Can Trust Me – Social Engineering

 

Exploiting the Target – Layer 2 (Physical & DLC Layers) Exploits

• Driver & Device Exploits

• Man-in-the-Middle

• MAC / ARP Floods

 

Exploiting the Target – Layer 3 (Network Layer) Exploits

• IPv4 Header and Option Exploits

• IPv6 Tunnel Exploits

• ICMPv4/v6 Exploits

• IPX SAP Exploits

 

Exploiting the Target – Layer 4 (Transport Layer) Exploits

• Exploiting TCP

• Header & Options, Resets, and Flags

• Exploiting SCTP

• Firewall & Intrusion Detection System (IDS) Exploits

 

Exploiting the Target – Layer 5-7 (Application) Exploits

• Drive-by-Downloads

• Ransomware, Crimeware, and Malware – Worms & Virus’s

• Fake Login’s & Password Hijacks

• Overflow’s

• Internet Exploits

 

Attacks

• Bots, Botnets, Bot Herders

• Denial of Service (DoS / DDoS)

 

Detecting, Analyzing, and Reconstructing Suspicions Activates

• Baselines & Sample Libraries

• Color Rules, Filtering & Pattern recognition

 

Section 7: They Encrypted their traffic – now what? – Forensics Analysis of Encryption Protocols

 

• Secure Socket Layer (SSL / Transport Layer Security (TLSv1-3)

• Wired Equivalency Protocol (WEP), WiFi Protected Access (WPA / WPA2)

• VPN and Tunneling Protocols

• Security Vulnerabilities & Exploits

• Analyzing Encrypted Traffic

 

Section 8: Alternative Forensic Information – an Introduction to Open-Source Intelligence (OSINT)

 

Overview and Terminology

• OSINT vs. HUMINT, GEOINT, FININT, SCOMINT, and CTI

 

Building an OSINT Profile – Collection of Information

• Using Wireshark and Other Direct Capture Tools to Collect OSINT

• Collecting and Evaluating Image and Exif data

• Credentials and User name

• Social Media Mapping

• Business Data Collection

 

Crypto-currency and OSINT

Email Enumeration

Video and OCR Information

Putting it all Together – Reporting

 

Where do we go from here?

 

• Wireshark 0 – TCP/IP Networking Fundamentals Using Wireshark

• Wireshark 1 – TCP/IP Troubleshooting & Network Optimization Using Wireshark

• Wireshark 2 – Masterclass – Advanced Network & Security Analysis

• Wireshark 3 – Network Forensics Analysis

• Wireshark 4 – Mobile Device Forensics Analysis

• Wireshark 5 – Cloud and Internet of Things (IoT) Advanced Network Analysis

• Wireshark 6 – VoIP Advanced Network Analysis

• Wireshark 7 – WiFi Advanced Network Analysis

• Wireshark 8 – SCADA and ICS Advanced Network Analysis

• Wireshark 9 – Wireshark Command Line Tools

Student qoutes

"It's sure the most interesting course that i have followed"

- Karin van der Plas

Course: TCP/IP Analysis and Troubleshooting with Wireshark

"It was a very very very interesting course, and done by the top guy"

- Matthew Steenwijk

Course: VoIP Network Analysis

"It was a real pleasure to receive the Wireshark training from a very dedicated trainer"

- Wim de Vries

Course: Voice & Video over IP Network Analysis Using Wireshark

"I thought I already knew Wireshark. I was wrong, very wrong"

- Jeroen Valkonet

Course: TCP/IP Analysis and Troubleshooting with Wireshark

"This course is a must have for everyone in IT"

- Johan den Besten

Course: TCP/IP Analysis and Troubleshooting with Wireshark

"Great for network analyses or forensic investigations"

- Sven Schneider

Course: Masterclass – Advanced Network & Intro to Security Analysis

"By far the very best course I ever took"

- Joachim van Doeselaar

Course: TCP/IP Analysis and Troubleshooting with Wireshark

"If there’s a packet, it can be WireSharked!!"

- Elena Petrova

Course: WiFi & Wireless Network Analysis Using Wireshark

"Extremely satisfied with the training. Very helpful instructor and great teaching methods"

- Lars Mikkelsen

Course: Masterclass – Advanced Network & Intro to Security Analysis

More courses within category Network / Training

Amsterdam / In-House / Virtual
duration: 5 days
T.B.A. 2025
This course is for Networking and Security personnel who need to develop packet investigation techniques by studying the IoT and Home Automation Protocols using Wireshark and other OpenSource Analysis tools...
duration: 5 days
T.B.A. 2025
This course will provide the student with a set of analysis techniquesfocusing on the use of vendor-neutral, Open-Source Tools to provide insight intothe following areas:

Sign up and register for Cyber Security & Network Forensics Analysis

A course only takes place if there is sufficient participation.
*
= required

Do you want to register for more than one course? Click here

Request information for Cyber Security & Network Forensics Analysis

*
= required

Do you want to request information for more than one course? Click here