O'Reilly logo

A Practical Guide to Computer Forensics Investigations by Darren R. Hayes

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Network Forensics

Learning Outcomes

After reading this chapter, you will be able to understand the following:

Image The importance of network forensics;

Image Hardware devices that contain network logs that are valuable to a forensics examiner;

Image IPv4 and IPv6;

Image The OSI Model;

Mistakes made when investigating networks;

Advanced persistent threats: ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required