Learning Network Forensics

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Learning Network Forensics by Samir Datt, Packt Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Samir Datt ISBN: 9781785282126
Publisher: Packt Publishing Publication: February 29, 2016
Imprint: Packt Publishing Language: English
Author: Samir Datt
ISBN: 9781785282126
Publisher: Packt Publishing
Publication: February 29, 2016
Imprint: Packt Publishing
Language: English

Identify and safeguard your network against both internal and external threats, hackers, and malware attacks

About This Book

  • Lay your hands on physical and virtual evidence to understand the sort of crime committed by capturing and analyzing network traffic
  • Connect the dots by understanding web proxies, firewalls, and routers to close in on your suspect
  • A hands-on guide to help you solve your case with malware forensic methods and network behaviors

Who This Book Is For

If you are a network administrator, system administrator, information security, or forensics professional and wish to learn network forensic to track the intrusions through network-based evidence, then this book is for you. Basic knowledge of Linux and networking concepts is expected.

What You Will Learn

  • Understand Internetworking, sources of network-based evidence and other basic technical fundamentals, including the tools that will be used throughout the book
  • Acquire evidence using traffic acquisition software and know how to manage and handle the evidence
  • Perform packet analysis by capturing and collecting data, along with content analysis
  • Locate wireless devices, as well as capturing and analyzing wireless traffic data packets
  • Implement protocol analysis and content matching; acquire evidence from NIDS/NIPS
  • Act upon the data and evidence gathered by being able to connect the dots and draw links between various events
  • Apply logging and interfaces, along with analyzing web proxies and understanding encrypted web traffic
  • Use IOCs (Indicators of Compromise) and build real-world forensic solutions, dealing with malware

In Detail

We live in a highly networked world. Every digital device—phone, tablet, or computer is connected to each other, in one way or another. In this new age of connected networks, there is network crime. Network forensics is the brave new frontier of digital investigation and information security professionals to extend their abilities to catch miscreants on the network.

The book starts with an introduction to the world of network forensics and investigations. You will begin by getting an understanding of how to gather both physical and virtual evidence, intercepting and analyzing network data, wireless data packets, investigating intrusions, and so on. You will further explore the technology, tools, and investigating methods using malware forensics, network tunneling, and behaviors. By the end of the book, you will gain a complete understanding of how to successfully close a case.

Style and approach

An easy-to-follow book filled with real-world case studies and applications. Each topic is explained along with all the practical tools and software needed, allowing the reader to use a completely hands-on approach.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Identify and safeguard your network against both internal and external threats, hackers, and malware attacks

About This Book

Who This Book Is For

If you are a network administrator, system administrator, information security, or forensics professional and wish to learn network forensic to track the intrusions through network-based evidence, then this book is for you. Basic knowledge of Linux and networking concepts is expected.

What You Will Learn

In Detail

We live in a highly networked world. Every digital device—phone, tablet, or computer is connected to each other, in one way or another. In this new age of connected networks, there is network crime. Network forensics is the brave new frontier of digital investigation and information security professionals to extend their abilities to catch miscreants on the network.

The book starts with an introduction to the world of network forensics and investigations. You will begin by getting an understanding of how to gather both physical and virtual evidence, intercepting and analyzing network data, wireless data packets, investigating intrusions, and so on. You will further explore the technology, tools, and investigating methods using malware forensics, network tunneling, and behaviors. By the end of the book, you will gain a complete understanding of how to successfully close a case.

Style and approach

An easy-to-follow book filled with real-world case studies and applications. Each topic is explained along with all the practical tools and software needed, allowing the reader to use a completely hands-on approach.

More books from Packt Publishing

Cover of the book Learning iOS 8 for Enterprise by Samir Datt
Cover of the book GameSalad Essentials by Samir Datt
Cover of the book jQuery Game Development Essentials by Samir Datt
Cover of the book Python Requests Essentials by Samir Datt
Cover of the book Feature Engineering Made Easy by Samir Datt
Cover of the book Django 1.2 E-commerce by Samir Datt
Cover of the book Learning iPhone Game Development with Cocos2D 3.0 by Samir Datt
Cover of the book Reporting with Microsoft SQL Server 2012 by Samir Datt
Cover of the book WordPress for Education by Samir Datt
Cover of the book Microservices Development Cookbook by Samir Datt
Cover of the book Cisco Unified Communications Manager 8: Expert Administration Cookbook by Samir Datt
Cover of the book PhoneGap Mobile Application Development Cookbook by Samir Datt
Cover of the book Mastering Machine Learning with scikit-learn - Second Edition by Samir Datt
Cover of the book Proxmox High Availability by Samir Datt
Cover of the book Hands-On Networking with Azure by Samir Datt
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy