Four-day Training Session
By Jonathan Ham and Sherri Davidoff
Train your staff to track down network-based attacks.
Enterprises all over the globe are compromised remotely by hackers each day. Attackers' footprints remain throughout the network, in firewall logs, IDS/IPS, web proxies, traffic captures, and more. Created by the authors of Network Forensics: Tracking Hackers Through Cyberspace (Prentice Hall, 2012), this fast-paced class includes packet analysis, statistical flow record analysis, wireless forensics, intrusion detection and analysis, network tunneling, malware network behavior-all packed into a dense 4 days, with hands-on technical labs throughout the class.