Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Swayam

Network Forensics

NITTTR via Swayam

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
This course in Network Forensics provides a comprehensive exploration of methodologies, tools, and challenges involved in investigating security incidents across modern digital networks. It begins with a review of core networking concepts and protocols before advancing to forensic principles, legal considerations, and their role in incident response. Learners gain hands-on expertise in data acquisition and analysis through tools such as Wireshark and TCP Dump, as well as advanced capture techniques like Promiscuous Mode and Network Port Mirroring. The course advances through a systematic analysis of forensic evidence across architectural layers, beginning with switch logs, MAC tables, and ARP tables at the Data Link and Physical layers. It then progresses to the Network layer with the examination of router, Wi-Fi, and firewall logs. We will lead you through engaging lectures, case studies, and interactive discussions, providing you with practical knowledge and actionable insights. Concluding with an assessment of real-world challenges such as encryption, spoofing, mobility, and privacy regulations, the course equips participants with both the practical skills and critical perspective required for effective and realistic network forensic investigations. By the end of this course, you will not only understand the fundamentals of Network Forensics but also be equipped with the skills and confidence to pursue opportunities and make a positive impact in this dynamic field.

Syllabus

UNIT 1:

Review of Networking concepts and Protocols, Introduction to Network Forensics, various aspects of Network Forensics.

UNIT 2:

Introduction to Network Forensic Tools and techniques: Wireshark, TCP Dump, Syslog, NMS, Promiscuous Mode, Network Port Mirroring, snooping, scanning tools, etc.

UNIT 3:

Understanding and Examining Data Link Layer, Physical Layer, Ethernet Switch Logs, MAC Table, ARP Table, etc. Understanding and Examining Network Layer, Router Logs, WiFi Device logs, Firewall logs

UNIT 4:

Understanding audit features of OS and applications; Enabling and Examining Server logs, User activity logs, Browser history analysis, Proxy server logs, Antivirus logs, Email logs

UNIT 5:

Limitations and challenges of network forensics due to encryption, spoofing, mobility, storage limitations, privacy laws, etc.


Taught by

Dr. Seshu Babu Pulagara

Reviews

Start your review of Network Forensics

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.