![]() Apple’s Routing Table Maintenance Protocol (RTMP). ![]() Understanding Communications between Routers.Novell NetWare’s use of the MAC Address in the Layer 3 Address.IPv4, IP Dotted Decimal Notation, Subnetting Fundamentals and IPv6.Understanding and Differentiating Between Address Representations.Communications Between Networks – Routing and Routing-related Protocols.Network Analysis Challenges in a Switched Network Environment.IEEE 802.1p/q Switch Tagging and VLAN’s.Introduction to the Spanning Tree Algorithm.How Bridges and Switches Work – Layer 2 vs.Introduction to Network Infrastructure Devices.Communications Between Segments – Bridges, Switches and Related Protocols.Introduction to Ethernet Frame Format Specifications.Protocol Suites – TCP/IP, AppleTalk, Novell, UNIX / Linux.Problems That May Be Discovered at Each Layer.Understanding and Applying the Concepts of the OSI Reference Model.Responsibilities Assigned to Each Layer.TCP / IP Networking Fundamentals Using Wireshark Attendees will receive a student guide including numerous reference files and networking and forensics tools, as well as a library of reference documents. Real-World examples will be utilized throughout the course in conjunction with numerous hands-on exercises to provide field proven, practical analysis skills. Open-Source Network and Forensics analysis Tools including Wireshark.Introduction to networking Protocol stacks including: TCP/IP, Linux/Unix, Novell, AppleTalk.Fundamentals of Protocol, Network and Forensics Analysis and troubleshooting techniques.Introduction to Network Infrastructure devices such as Hubs, Switches, Routers / Gateways / Proxies and Firewalls.Open Systems Interconnect (OSI) reference model and basic networking architectures and communications modals.This course will provide the student with an introduction to investigative techniques focusing on the use of vendorneutral, Open-Source Tools such as Wireshark to provide insight into the following areas: Network and Forensics Analysis encompasses the skills of not only capturing data, but also the ability to discern unusual patterns hidden within seemingly normal network traffic.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |