Erik is the creator of NetworkMiner and an experienced incident handler who has specialized in the field of network forensics.
Registration is currently closed
A hands-on network forensics course that allows you to deep dive into analyzing captured full content network traffic in PCAP files. The training data is a unique data set captured during 30 days on an Internet connected network with multiple clients, an AD server, a web server, an android tablet and some embedded devices.
We will analyze traffic from multiple intrusions by various attackers, including APT style attackers and botnet operators. The initial attack vectors are using techniques like exploitation of web vulnerabilities, spear phishing, a supply chain attack and a man-on-the-side attack!
Part 1 (4 hours)
Part 2 (4 hours)
Part 3 (4 hours)
Part 4 (4 hours)
The Network Forensics for Incident Response course is built for blue teams, incident responders and SOC analysts, but can also be relevant for law enforcement investigators. Students must be comfortable using linux command line tools and have a basic understanding of TCP/IP communications.
Would you like us to visit your facility to do on-site training? If you’re in the European Union, then that can be arranged. Please contact us for further details.
Would you like us to teach our network forensics class as a private live online training exclusively to your team? Please contact us for further details.