Network Forensics

Network Forensics

Network Forensics

Secure Networks with Advanced Forensic Techniques

In Partnership With:
Ngee Ann Pol

In Partnership With: 

Ngee Ann Polytechnic Logo

Supporting Partner:

View Course Brochure


View Brochure

Course Fee

Full Course Fees

SG Citizen (aged 21-39) or PR

SG Citizen (aged 40 & above)

Full Fees

$19,500

$19,500

$19,500

SkillsFuture Funding

-

$13,650 (70% Subsidy)

$17,550 (90% Subsidy)

Total Nett Fee

$19,500

$5,850

$1,950

GST (9%)

$1,755

$526.5

$526.5

Total Fee Payable

$21,255

$6,376.50

$2,476.50

Additional Funding: SkillsFuture Credits (up to $1,000), UTAP ($200-$500) & PSEA can be used to pay for course fees after subsidy

Programme Fees & Funding

Introduction To Cybersecurity SkillsFuture Funding Table

Learning Outcomes: 

Participants will

  • Master packet analysis with tools like Wireshark and Zeek.
  • Tackle real-world network intrusion and MiTM attack cases.
  • Develop skills in IDS and IPS configuration and operation.
  • Understand network anomalies and mitigation strategies.
  • Learn to craft and analyse packets, including IPv6.

Question text goes here
  • Become familiar with different attack scenarios

Course Syllabus:

Chapter 01
Intrusion Detection

Networking

  • Network Protocols
  • Packet Structure
  • Netstat and ProcMon
  • SysInternal

Intrusion Detection Methods

  • Wireshark Advanced: Network Attacks
  • TShark Analysis
  • GeoIP Integration

Using the Scapy Module

  • Crafting and Analysing Packets
  • Working with IPv6

Zeek

  • Output Logs
  • Automating Process
  • Monitoring Data in Logs
  • Zeek-Cut Parsing
  • Replaying Packets for Investigating
  • Creating a Timeline

Chapter 02
Network Analysis
Question text goes here
  • Become familiar with different attack scenarios

Investigation Process

  • MiTM Attack
  • Find Network Anomalies
  • Flow Analysis
  • Network File Carving
  • NetworkMiner
  • File Carvers
  • Capturing Wireless Traffic
  • Gaining Access Through Wi-Fi
  • HTTPS Traffic

Chapter 03
Case Investigation
Question text goes here
  • Become familiar with different attack scenarios

IPS and IDS

  • Sysmon
  • Installing and Configuration Sysmon
  • Network Events
  • IDS/IPS Operation Process
  • IDS/IPS Configuration
  • Snort

Chapter 04
Mitigation
Question text goes here
  • Become familiar with different attack scenarios
Chapter 05
Question text goes here
  • Become familiar with different attack scenarios

Training Schedule:

Tailored To Client

Tailored To Client
Question text goes here

Training Methodology:

Apprenticeship-based Training

  • Experience hands-on learning with our demonstration method on a virtual/host machine, ensuring immersive understanding.
  • Our trainers prioritise showing over telling, explaining intricacies without relying on slides, offering direct engagement.
  • Bridge your knowledge gap by connecting theoretical concepts to practical cybersecurity applications, enhancing career readiness.

Practice Labs

  • Engage in repeated practice sessions to solidify and reinforce your understanding.
  • Delve deeper with practice questions, encouraging students to explore interconnected topics and enhance comprehension.
  • Stimulate critical thinking through challenge questions, prompting students to seek solutions and broaden their problem-solving abilities.

Assessment and Project

  • Equip yourself with the expertise and tools essential for navigating corporate networks safely.
  • Gain a comprehensive understanding of cyber-attacks to fortify your digital environment effectively.
  • Broaden your horizon by familiarising yourself with diverse cyber-attack scenarios and their implications.

Question text goes here
  • Become familiar with different attack scenarios

FAQs:

Question text goes here
  • Become familiar with different attack scenarios

In partnership with: 

Ngee Ann Polytechnic Logo
Quick Info
Programme Fee
Custom Pricing
Duration
5 Days (8 hours/day)
Schedule
Tailored To Client
Teacher-to-Student Ratio
1:30
Delivery Mode
On-site
Entry Requirement
Schedule A Consultation
View Course BrochureRegister NowBook Your SlotView BrochureView Brochure

Secure Your Future

Find out more about how we can help you secure your future in cybersecurity

Talk to us on
WhatsApp!