Course Summary

This Evergreen Alliance training course prepares you for the GIAC Network Forensic Analyst (GNFA) certification, which demonstrates your ability to perform advanced analysis of network forensic artifacts. The course validates your expertise in the fundamental practices of network forensics, including processing and interpreting both normal and abnormal network activity, as well as analyzing application behavior through system logs, network traffic captures, and network metadata.

Key topics covered include:

Network architecture, protocols, and reverse engineering of network protocols
Encryption and encoding techniques, NetFlow analysis, attack visualization, and security event & incident logging
Utilization of network analysis tools and open-source network security proxies

Common Network Protocols
The candidate will demonstrate an understanding of the behavior, security risks, and controls associated with common network protocols.

Encryption and Encoding
The candidate will understand techniques and practices used to encode and encrypt network traffic, as well as common attacks targeting these controls.

NetFlow Analysis and Attack Visualization
The candidate will be familiar with utilizing NetFlow data and related information sources to identify network-based attacks.

Network Architecture
The candidate will understand the process of designing and deploying networks using diverse transmission and collection technologies.

Network Protocol Reverse Engineering
The candidate will be knowledgeable about the tools and techniques required to analyze various protocols and data traversing network environments.

Open Source Network Security Proxies
The candidate will have an understanding of the architecture, deployment, benefits, and limitations of open-source network security proxies, as well as common log formats and data flow in network environments.

Security Event and Incident Logging
The candidate will be familiar with different log formats, protocols, and the security implications of event generation processes. They will understand how to configure and deploy logging aggregators and collection devices across a network environment for security.

Wireless Network Analysis
The candidate will understand how to identify and mitigate risks associated with wireless technologies, protocols, and infrastructure.

There are currently no prerequisites for this course.

proctored exam 66 questions 3 hours Minimum passing score of 70%

Following your booking, a confirmation message will be sent to all participants, ensuring you're well-informed of your successful enrollment. Calendar placeholders will also be dispatched to assist you in scheduling your commitments around the course. Rest assured, all course materials and access to necessary labs or platforms will be provided no later than one week before the course begins, allowing you ample time to prepare and engage fully with the learning experience ahead.

Our comprehensive training package includes all the necessary materials and resources to facilitate a full learning experience. Enrollees will be provided with detailed course content, encompassing a wide array of topics to ensure a thorough understanding of the subject matter. Additionally, participants will receive a certificate of completion to recognize their dedication and hard work. It's important to note that while the course fee covers all training materials and experiences, the examination fee for certification is not included but can be purchased separately.

Questions About This Course?