Company: O'Reilly Author: Ric Messier Full Title: Capture And Analysis Of Network-based Evidence Year: 2017 Language: English Genre: Educational: Networking Skill Level: - Price: - - Files: MP4 Time: 01:32:06 Video: AVC, 1280 x 720 (1.778) at 29.970 fps, 920 kbps Audio: AAC at 125 Kbps, 2 channels, 48.0 KHz In our globally connected and online world today, massive amounts of data flow across countless networks. Much of that data is ephemeral, meaning that after it has passed across the network, it’s gone. For law enforcement and IT professionals who are engaged in digital forensic investigations, understanding how to read the data transmitted on a network is crucial to carrying out their task. This is especially important in the case of incident response and corporate investigations and can help in identifying unauthorized intrusions on a network. If want to become part of the ever-growing ranks of digital investigators and you have entry- to intermediate-level computer skills, this course will show you how to use the industry-favorite tool Wireshark to capture and analyze network traffic. You’ll learn how to extract files from the “packets” that make up digital transmissions over a network. And, you’ll see how to locate and identify the important header information and metadata contained in those packets. Lessons: Introduction 01.Welcome To The Course 02. About The Author Wireshark 03. About Wireshark 04. Capturing Packets 05. Header Analysis - IP 06. Header Analysis - UDP 07. Header Analysis - TCP 08. Application Layer Analysis 09. Expert Information 10. Statistics 11. Following Streams 12. Filtering 13. Using GeoLocation 14. Communication Endpoints 15. Decoding Packets 16. Extracting Files Information Extraction 17. NetworkMiner 18. NetworkMiner Files 19. NetworkMiner Conversations 20. xplico Network Artifacts 21. Layer 2 Data With ARP 22. Getting Routing Information 23. Getting Network Connections With netstat 24. Windows Information With nbtstat 25. Gathering Information With ifconfig 26. Gathering Information With ipconfig 27. Gathering Known Wireless Networks Conclusion 28. What We Covered Damnant quod non intellegunt! ------------- Damnant quod non intellegunt!