Services
ARICHRIS TECH TRAINING SCHOOL
Topic 1: Hands on Network Security Audit with focus on Routers
Network security is any activity designed to protect the usability and integrity of your network and data. It includes both hardware and software technologies. Effective network security manages access to the network. It targets a variety of threats and stops them from entering or spreading on your network.
Objective:
Participant will understand how packet moves within an internetwork, how it is filter.
- Network interface: Which network did this packet come from?
- Source: What IP address did it come from?
- Destination: Where does it want to go?
- Packet type
- Protocol: What language to talk--for example, HTTP for Web traffic or SMTP for e-mail.
- Port to use: matches the packet with a particular service running on a computer--for example, e-mail is usually on port 25, Web runs over port 80
Topic 2: Digital Forensics Applications & Practices (two days training)
Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime.
Objective. -
Learn the application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation.
- Learn how tools like Wireshark collect all data on layers and allows the user to filter for different events. Like website pages, email attachments, and other network traffic can be reconstructed only if they are transmitted or received unencrypted. An advantage of collecting this data is that it is directly connected to a host. For example the IP address or the MAC address of a host at a certain time is known, all data sent to or from this IP or MAC address can be filtered.
- Routing tables are one of the best sources of information if investigating a digital crime and trying to track down an attacker. To do this, it is necessary to follow the packets of the attacker, reverse the sending route and find the computer the packet came from (i.e., the attacker).
- How web server logs can be used to show when (or if) a suspect accessed information related to criminal activity. Email accounts can often contain useful evidence; but email headers are easily faked and, so, network forensics may be used to prove the exact origin of incriminating material. <<< Previous Page - Next Page >>> - Click To Download The Training Calender.