From the course: Computer Hacking Forensics Investigator (CHFI) Cert Prep
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
Network forensics
From the course: Computer Hacking Forensics Investigator (CHFI) Cert Prep
Network forensics
Hi, everyone. Welcome back to the course. So in the last module, we wrapped up our discussion on operating system forensics. In this module, we're going to talk about network forensics. So just a quick pre-assessment question. Real-time analysis occurs after an attack is complete. Is that True or False? All right. So that's False. And the name kind of gives it away there. So real-time would actually be in real time. All right. So network forensics. So basically, as the name implies, this is related to the monitoring or analysis of network traffic. And basically, that's used to discover the source of attacks or other problems. Right. So if there's a crime committed and we feel that the information might be in different packets on the network. So, for example, thinking like child pornography. Right. So they're going out there, you know, the bad person is going out to this child porn website or downloading files. We may be able to grab some good information about that communication…