Network Forensics

Network Forensics

Network Forensics

Secure Networks with Advanced Forensic Techniques

In Partnership With:
Ngee Ann Pol
View Course Brochure


View Brochure

Course Fee

Full Course Fees

SG Citizen (aged 21-39) or PR

SG Citizen (aged 40 & above)

Full Fees

$19,500

$19,500

$19,500

SkillsFuture Funding

-

$13,650 (70% Subsidy)

$17,550 (90% Subsidy)

Total Nett Fee

$19,500

$5,850

$1,950

GST (9%)

$1,755

$526.5

$526.5

Total Fee Payable

$21,255

$6,376.50

$2,476.50

Additional Funding: SkillsFuture Credits (up to $500), UTAP ($200-$500) & PSEA can be used to pay for course fees after subsidy

Learning Outcomes: 

    Participants will

    • Master packet analysis with tools like Wireshark and Zeek.
    • Tackle real-world network intrusion and MiTM attack cases.
    • Develop skills in IDS and IPS configuration and operation.
    • Understand network anomalies and mitigation strategies.
    • Learn to craft and analyse packets, including IPv6.

    Course Syllabus:

    Chapter 01
    Intrusion Detection

    Networking

    • Network Protocols
    • Packet Structure
    • Netstat and ProcMon
    • SysInternal

    Intrusion Detection Methods

    • Wireshark Advanced: Network Attacks
    • TShark Analysis
    • GeoIP Integration

    Using the Scapy Module

    • Crafting and Analysing Packets
    • Working with IPv6

    Zeek

    • Output Logs
    • Automating Process
    • Monitoring Data in Logs
    • Zeek-Cut Parsing
    • Replaying Packets for Investigating
    • Creating a Timeline

    Chapter 02
    Network Analysis
    Question text goes here
    • Become familiar with different attack scenarios

    Investigation Process

    • MiTM Attack
    • Find Network Anomalies
    • Flow Analysis
    • Network File Carving
    • NetworkMiner
    • File Carvers
    • Capturing Wireless Traffic
    • Gaining Access Through Wi-Fi
    • HTTPS Traffic

    Chapter 03
    Case Investigation
    Question text goes here
    • Become familiar with different attack scenarios

    IPS and IDS

    • Sysmon
    • Installing and Configuration Sysmon
    • Network Events
    • IDS/IPS Operation Process
    • IDS/IPS Configuration
    • Snort

    Chapter 04
    Mitigation
    Question text goes here
    • Become familiar with different attack scenarios
    Chapter 05
    Question text goes here
    • Become familiar with different attack scenarios

    Training Schedule:

    Tailored To Client

    Tailored To Client
    Question text goes here

    Training Methodology:

    Apprenticeship-based Training

    • Experience hands-on learning with our demonstration method on a virtual/host machine, ensuring immersive understanding.
    • Our trainers prioritise showing over telling, explaining intricacies without relying on slides, offering direct engagement.
    • Bridge your knowledge gap by connecting theoretical concepts to practical cybersecurity applications, enhancing career readiness.

    Practice Labs

    • Engage in repeated practice sessions to solidify and reinforce your understanding.
    • Delve deeper with practice questions, encouraging students to explore interconnected topics and enhance comprehension.
    • Stimulate critical thinking through challenge questions, prompting students to seek solutions and broaden their problem-solving abilities.

    Assessment and Project

    • Equip yourself with the expertise and tools essential for navigating corporate networks safely.
    • Gain a comprehensive understanding of cyber-attacks to fortify your digital environment effectively.
    • Broaden your horizon by familiarising yourself with diverse cyber-attack scenarios and their implications.

    Question text goes here
    • Become familiar with different attack scenarios

    FAQs:

    Question text goes here
    • Become familiar with different attack scenarios
    Quick Info
    Programme Fee
    Custom Pricing
    Duration
    5 Days (8 hours/day)
    Schedule
    Tailored To Client
    Teacher-to-Student Ratio
    1:30
    Delivery Mode
    On-site
    Entry Requirement
    Schedule A Consultation
    View Course BrochureRegister NowBook Your SlotView Brochure

    Secure Your Future

    Find out more about how we can help you secure your future in cybersecurity

    Talk to us on
    WhatsApp!