ORE | Capture And Analysis Of Network-based Evidence (2017 EN)

Discussion in 'Information Technology' started by Kanka, Jul 11, 2019.

  1. Kanka

    Kanka Well-Known Member Loyal User

    Messages:
    16,037
    Likes Received:
    449
    Trophy Points:
    83
    [​IMG]

    Company: O'Reilly
    Author: Ric Messier
    Full Title: Capture And Analysis Of Network-based Evidence
    Year: 2017
    Language: English
    Genre: Educational: Networking
    Skill Level: -
    Price: -
    -
    Files: MP4
    Time: 01:32:06
    Video: AVC, 1280 x 720 (1.778) at 29.970 fps, 920 kbps
    Audio: AAC at 125 Kbps, 2 channels, 48.0 KHz



    In our globally connected and online world today, massive amounts of data flow across countless networks. Much of that data is ephemeral, meaning that after it has passed across the network, it’s gone. For law enforcement and IT professionals who are engaged in digital forensic investigations, understanding how to read the data transmitted on a network is crucial to carrying out their task. This is especially important in the case of incident response and corporate investigations and can help in identifying unauthorized intrusions on a network.

    If want to become part of the ever-growing ranks of digital investigators and you have entry- to intermediate-level computer skills, this course will show you how to use the industry-favorite tool Wireshark to capture and analyze network traffic. You’ll learn how to extract files from the “packets” that make up digital transmissions over a network. And, you’ll see how to locate and identify the important header information and metadata contained in those packets.


    Lessons:
    Introduction
    01.Welcome To The Course
    02. About The Author
    Wireshark
    03. About Wireshark
    04. Capturing Packets
    05. Header Analysis - IP
    06. Header Analysis - UDP
    07. Header Analysis - TCP
    08. Application Layer Analysis
    09. Expert Information
    10. Statistics
    11. Following Streams
    12. Filtering
    13. Using GeoLocation
    14. Communication Endpoints
    15. Decoding Packets
    16. Extracting Files
    Information Extraction
    17. NetworkMiner
    18. NetworkMiner Files
    19. NetworkMiner Conversations
    20. xplico
    Network Artifacts
    21. Layer 2 Data With ARP
    22. Getting Routing Information
    23. Getting Network Connections With netstat
    24. Windows Information With nbtstat
    25. Gathering Information With ifconfig
    26. Gathering Information With ipconfig
    27. Gathering Known Wireless Networks
    Conclusion
    28. What We Covered


    -------------