Computer Network Forensics Course Outline
Computer Network Forensics Course Outline
COURSE OBJECTIVE: This course is aimed at exploring methods for capturing, recording, and
analyzing network traffic for the purpose of detecting and investigating network system intrusions.
COURSE OUTCOMES: Upon completion of the course, learners will should be able to;
- Evaluate the impact of network types and laws on network forensics investigations.
- Utilize tools and apply best practices to conduct flow and packet analysis.
- Apply best practices to collect, preserve, and transport evidence of digital intrusions.
- Create a self- contained evidence report in a legally appropriate and defensible document.
OUTLINE: 13 CHAPTERS.
LESSONS:
OBJECTIVES: This chapter aims at defining network protocols, POST OFFICE PROTOCOL(POP),
SIMPLE MAIL TRANSFER PROTOCOL(SMTP), AND INTERNET MESSAGE ACCESS
PROTOCOL(IMAP). This chapter also describes the different layers of the OSI network
reference model.
LESSONS:
OBJECTIVES: This chapter lists the types of network security and explains its importance.
Offers explanations of network security design, risk assessments, audits and policies.
LESSONS:
LESSONS:
LESSONS:
OBJECTIVES: This chapter discusses about digital forensics software, evidence in digital
crimes and the impact of network type on network forensic investigations. Outlines how to
undo the deletion of data, handle digital evidence and conduct computer investigations.
LESSONS:
OBJECTIVES: This chapter offers an overview of network traffic analysis, network scanners
and network traffic flows and sessions. Explains how to capture network traffic, use sniffers
in monitoring networks and detect network and port scans.
LESSONS:
OBJECTIVES: This chapter describes the intrusion detection system (IDS), intrusion
prevention system (IPS), firewall in network security and proxy server.
LESSONS:
OBJECTIVES: This chapter explores the role of email headers in digital forensics
investigations and how to trace emails and email servers. Discusses email in digital forensics
and digital forensics laws.
LESSONS:
OBJECTIVES: This chapter defines computer virus remediation, advanced malware, mobile
malware and malware analysis. Lists methods for detecting computer viruses.
LESSONS:
OBJECTIVES: This chapter discusses basic encryption methods, IPSec vs. SSL, RSA algorithms,
AES and DES. Defines public key encryption, SSH proxy tunnels, symmetric encryption and
HTTPS encryption.
LESSONS:
OBJECTIVES: This chapter explains the purpose of first responders and breach control in
network forensics. Describes the digital forensics lab and how to create evidence reports in
network forensics.
LESSONS: