From the course: Computer Hacking Forensics Investigator (CHFI) Cert Prep

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

Network forensics

Network forensics

Hi, everyone. Welcome back to the course. So in the last module, we wrapped up our discussion on operating system forensics. In this module, we're going to talk about network forensics. So just a quick pre-assessment question. Real-time analysis occurs after an attack is complete. Is that True or False? All right. So that's False. And the name kind of gives it away there. So real-time would actually be in real time. All right. So network forensics. So basically, as the name implies, this is related to the monitoring or analysis of network traffic. And basically, that's used to discover the source of attacks or other problems. Right. So if there's a crime committed and we feel that the information might be in different packets on the network. So, for example, thinking like child pornography. Right. So they're going out there, you know, the bad person is going out to this child porn website or downloading files. We may be able to grab some good information about that communication…

Contents