Network Packet Forensics Analysis Training (NPFAT) provides sufficient knowledge to students on the most common Internet Protocols (such as HTTP, IM, Email, Telnet, Video Streaming, VoIP etc), collection, capturing of network packets, analyzing and reconstruction of the network packets that contains these protocols, solutions implementation, and application as well as, some practical case studies. This training course provides the solutions based on Decision Computer E-Detective series of products that will assist the Network Security Manager, Administrator, Security Auditor, Forensics Investigators (Police, Military Intelligence, National Security etc.), and Law Enforcement Officers to preserve network digital evidence and extend the network based crime investigation.
The NPFAT course equips Forensics Investigators and Law Enforcement Offices with sufficient knowledge to conducting investigation on Internet-based or Cyber-based crime. It will provide knowledge on implementing the right solutions for collecting, analyzing, correlating the Internet data, and reporting them as valid and legal evidence in the court. The detailed explanation of various Internet protocols is aimed to provide the investigators with in-depth information in order to deploy or explain it (the operation and architecture) if required.
Network Administrators and Security Auditors will learn to analyze various Internet protocols and be able to identify the online behavior of the network users. This allows them to track down and identify users that have occupied most of the company Internet bandwidth for unnecessary actions. Also, if there is any dispute or even loss of confidential company information or data through the Internet, the culprit can be identified with the evidence being captured and preserved.
This training course with hands-on practical session is intended for new users, particularly network administrators, security auditors, forensic professionals, and law enforcement personnel who uses Network Forensics Tool or other forensics software to examine, analyze and classify digital evidence. To gain the maximum benefit from this course, you should meet the following requirements:
Read and understand the English language.
Perform basic operations on a computer.
Have Knowledge in Computer Networking, Wireless Networking
Have Knowledge in Information, Network and Wireless Security