computer forensics training page
computer forensics training page
 
Home    |    Services    |    Client Listing   |   Student Listing   |   Certifications   |    Mailing List  
About Us   |   Documents   |    Customer Comments    |    Contact Us
Digital Forensic Certifications
  CSFA / CSICI
Training Courses
  Computer Forensics Core Competencies
5 Day
  Computer Forensics for Attorneys 1 Day
  Packet Analysis and Intrusion Detection 5 Day
  Computer Forensics Fundamentals 1 Day
  Windows Forensics Essentials 2 Day
Services
  Litigation Support / Expert Witness
  Businesses
  Individuals
Lists
  Mailing List
  Clients
Documents
  The "Tools Proven in Court" Question
  Getting Started In Information Security / Digital Forensics
  What Is Computer Forensics?

 

 
computer forensics training title

For in-house training, please contact us for a quote at sales@csisite.net

computer forensics training image

PRICES/ENROLL IN THIS COURSE

Course Overview
You'll learn how to properly read and interpret packets and packet headers including IP, TCP, ICMP, and UDP. You will learn how to distinguish between normal, abnormal, and malicious traffic. You will also create and respond to attacks such as Smurf, Tribe Flood Network, Stacheldracht, and Targa among others. You will see how man-in-the-middle attacks are perpetrated, and how to prevent them. You will see how hackers bring down routers and switches, and will learn how to protect network infrastructures as well as properly setup and maintain an Intrusion Detection System.

Who Should Take This Class?
Anyone in an information technology related field. New information security personnel, IT security officers, information security professionals, security auditors, network engineers, network administrators, troubleshooters and technicians. Appropriate for anyone interested in network security and the forensic value of performing packet analysis - technical CEOs and law enforcement as well.

Why This Class?
Don't pay thousands of dollars to attend a crowded class where either the instructor has no time for your questions or is not capable of answering your questions. Small class sizes (fifteen or less) mean that your questions will get answered, and additional help will be given when needed. Your instructor is a seasoned IT professional with over 22 years of experience and the ability to break down complex material into material you will understand.

What Are Some Applications Of Packet Analysis?
1. Gleaning clear-text usernames and passwords from network traffic. Used by hackers for unauthorized access. Used by IT professionals to test security of network traffic.

2. Performance and fault analysis to discover network bottlenecks and communication problems.

3. Differentiating normal from abnormal and malicious traffic.

4. Authenticating and analyzing what Intrusion Detection Systems and Firewalls are recording as attacks.

5. Making certain that the information captured in network traffic logs is reliable, and will withstand scrutiny when used in a legal or administrative proceeding.

Prerequisites
Students should have at least one network certification such as Network+ or CCNA, or equivalent work experience.

Schedule

Day One
IP Theory
TCP Theory
ICMP Theory
Mapping Networks
Packet Fragmentation
The Domain Name System
Routing
Packet Capture Exercises

Day Two
Using TCPdump
Using Ethereal
Normal and Malicious Activity
Traffic Analysis using TCPdump
Traffic Analysis using Ethereal
Insertion and Evasion Attacks
Examining Embedded Protocol Header Fields
Trojan Scans
Worm Scans
Man-in-the-middle Attacks

Day Three
Operating System Fingerprinting
Creating TCPdump Filters
Creating Ethereal Filters
Intrusion Detection
Introduction to Snort
Creating Snort Rules
Formatting Rule Options
The Mitnick Attack
TFN Attacks
Smurf Attacks

Day Four
Attack Countermeasures
Calculating Attack Severity
IDS Sensor Placement
Host/Network Based IDS
Security Models
Defining Risk
Honeypots

Day Five
Common Exploits and Their Signatures - Exercises
Packet Analysis - Exercises
Incident Response Procedures - Exercises

Your Instructors and Hosts
Steve Hailey, President and CEO of CyberSecurity Institute -
Steve's Bio
Mike Andrew, Vice President
of CyberSecurity Institute - Mike's Bio

Course Dates and Locations
Location ENROLLMENT IS CLOSED - CLASS IS FULL/PRIVATE CORPORATE CLASS
Address NOTE: 800-726-1433 TO SCHEDULE PRIVATE/CORPORATE TRAINING FOR THIS CLASS.
Dates/Times

Jan 7-9 2012

Cost $2500.00
To Enroll

CLASS IS FULL - WAITING LIST ONLY, CONTACT: waitinglist@csisite.net

Additional
Information
For in-house training, please contact us for a quote by using sales@csisite.net
Legal Stuff | Privacy Policy | Contact Us
Copyright © 1999-2005 SP Hailey Enterprises all rights reserved. Reproduction in whole or in part in any form or medium without the expressed written permission of SP Hailey Enterprises is prohibited. CyberSecurity Institute™, CyberSecurity Institute Certified Instructor (CSICI)™, CyberSecurity Forensic Analyst (CSFA)™, Computer Forensics Core Competencies™are trademarks used by SP Hailey Enterprises.