
- 372 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
Network forensics is a rapidly growing field with a high demand for skilled professionals. This book provides a comprehensive guide on the subject, covering everything from the fundamentals to advanced topics such as malware analysis and cyber attack investigation.Written by a seasoned expert with over 15 years of experience, this hands-on guide includes practical exercises in offensive security, Windows internals, reverse engineering, and cyber forensics. The book begins with the basics of network forensics, including concepts like digital evidence, network traffic analysis, and log analysis. It teaches you how to identify intrusion attempts, mitigate cyber incidents, and investigate complex cyber attacks. As you progress through the book, you will learn more advanced topics such as malware analysis, reverse engineering, and memory forensics. You will also learn how to use network forensics tools and techniques to investigate real-world incidents. This book concludes with a discussion of the career opportunities available in network forensics and teaches you how to find a job in the field and develop your skills.Overall, this book is an excellent resource for anyone interested in learning about network forensics.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover Page
- Title Page
- Copyright Page
- Dedication
- About the Author
- Acknowledgement
- Preface
- Table of Contents
- 1. Foundations of Network Forensics
- 2. Protocols and Deep Packet Analysis
- 3. Flow Analysis versus Packet Analysis
- 4. Conducting Log Analysis
- 5. Wireless Forensics
- 6. TLS Decryption and Visibility
- 7. Demystifying Covert Channels
- 8. Analyzing Exploit Kits
- 9. Automating Network Forensics
- 10. Backtracking Malware
- 11. Investigating Ransomware Attacks
- 12. Investigating Command and Control Systems
- 13. Investigating Attacks on Email Servers
- 14. Investigating Web Server Attacks
- Index