|:||Download Training Details|
The tendency to the cyber world, which has become a part of today's social life, is increasing day by day. The case has attracted the attention of the crime centers, though information systems have been used as a crime tool.
One of the most important aspects of the investigation of cyber-crimes is numerical evidence. One of the first words that come to mind when the information system is called is "network connections". Network connections turn into sometimes internet, local or private network and GSM networks.
With this training, the working logic of the computer and GSM networks, which are considered as the most important tools of today's information world, or by using the internet or GSM infrastructures of crime centers and by using methods such as how they commit crime, and forensic information analysis techniques for the detection of these crimes are explained.
At the end of the training, each participant will have the chance to see the processes such as incident analysis; evidence gathering, backtracking, and spoliation in the crimes committed using computer networks.
Network Forensics Concepts
Protocol Analysis from TCP/ IP Networks
Encrypted Traffic Analysis
In-Depth Package Analysis
Hardware Components in Network Traffic Analysis