Cyber Forensics Xpert - Network and Virtualization
Digital transformation is changing all aspects IT operations. As IT environments grow increasingly complex, virtualization technology can make enterprises of all sizes more efficient, by boosting efficiency and agility. Today, virtualization powers most enterprise applications, so securing the underlying hardware of the virtualization system is critical for businesses in the ever-changing threat landscape.
Star Cyber Forensic Xpert - Network and Virtualization (SCFX) is the most advanced certification in the field of information security. This certification focuses on the two most commonly faced areas of forensic investigation – virtualization and network. SCFX certification provides the practical knowledge of the what, when, where, who and why of an incident within a network and virtual infrastructure. This course first provides the knowledge of various network forensics scenarios and then moves towards the concepts required to investigate the virtual environments.
Audience
Cyber Forensic Xpert - Network and Virtualization Course Objectives
In this course, you will learn about:
- Fundamentals of networks and digital forensics
- Network traffic analysis
- Investigating network devices, servers and logs
- Wireless network forensics
- Virtualization concepts, desktop and server virtualization
- Virtualization and forensics
- Virtualization challenges
- Cloud computing and forensics
Course Outcome
After competing this course, you will be able to:
- Understand digital evidence and network forensics
- Monitor and analyse network traffic like packets, statistical flow and protocol
- Perform forensics on wireless networks and malware
- Investigate network IDS, web proxies, network devices and firewalls
- Set up desktop and server virtualization
- Investigate virtual environments and infrastructures
- Deploy advanced authentication methods
- Describe cloud computing and forensics
Table Of Contents Outline
Domain 1. Basics of Networks and Forensics
- Introduction to Digital Evidence and Forensics
- Networking Fundamentals
- Acquiring Network Evidence
Domain 2. Analyzing Network Traffic
- Analyzing Protocol, Packets, Flow and Traffic
- Analyzing Statistical Flow
- Performing Wireless Network Forensics
Domain 3. Investigating Network Devices, Servers and Logs
- Investigating Network Intrusion Detection Systems
- Investigating Switches, Routers and Firewalls
- Investigating Web Proxies
- Investigating, Collecting and Analyzing Event Logs
- Exploring Network Tunnels
- Malware Forensics
Domain 4: Introducing Virtualization
- Insights on Virtualization
- Desktop Virtualization
- Server Virtualization
Domain 5: Virtualization and Forensics
- Imaging Virtual Environments
- Investigating Dead and Live Virtual Environments
- Investigating Virtual Infrastructure
- Securing Traffic in a XenApp and XenDesktop Environment
- Implementing Advanced Authentication Methods for XenApp and XenDesktop
- Virtualization Challenges
- Cloud Computing and Forensics