Course Summary
This Evergreen Alliance training course prepares you for the GIAC Network Forensic Analyst (GNFA) certification, which demonstrates your ability to perform advanced analysis of network forensic artifacts. The course validates your expertise in the fundamental practices of network forensics, including processing and interpreting both normal and abnormal network activity, as well as analyzing application behavior through system logs, network traffic captures, and network metadata.
Key topics covered include:
Network architecture, protocols, and reverse engineering of network protocols
Encryption and encoding techniques, NetFlow analysis, attack visualization, and security event & incident logging
Utilization of network analysis tools and open-source network security proxies
Common Network Protocols
The candidate will demonstrate an understanding of the behavior, security risks, and controls associated with common network protocols.
Encryption and Encoding
The candidate will understand techniques and practices used to encode and encrypt network traffic, as well as common attacks targeting these controls.
NetFlow Analysis and Attack Visualization
The candidate will be familiar with utilizing NetFlow data and related information sources to identify network-based attacks.
Network Architecture
The candidate will understand the process of designing and deploying networks using diverse transmission and collection technologies.
Network Protocol Reverse Engineering
The candidate will be knowledgeable about the tools and techniques required to analyze various protocols and data traversing network environments.
Open Source Network Security Proxies
The candidate will have an understanding of the architecture, deployment, benefits, and limitations of open-source network security proxies, as well as common log formats and data flow in network environments.
Security Event and Incident Logging
The candidate will be familiar with different log formats, protocols, and the security implications of event generation processes. They will understand how to configure and deploy logging aggregators and collection devices across a network environment for security.
Wireless Network Analysis
The candidate will understand how to identify and mitigate risks associated with wireless technologies, protocols, and infrastructure.
Other Popular Courses
CompTIA: SecurityX
- Duration: 5 Days
- Language: English
- Level: Advanced
- Exam: CAS-005
Executive Cyber Risk Certification (ECRC)
- Duration: 2 Days
- Language: English
- Level: Advanced
- Exam: ECRC
Mastering Communication & Presentation Te...
- Duration: 5 Days
- Language: Danish
- Level: Intermediate
- Exam: MCPT