Join us for Wild West Hackin’ Fest Deadwood virtual conference! Register Here

Network Forensics and Incident Response with Troy Wojewoda

Course Authored by .

This course covers incident handling fundamentals, attacker methodologies, network protocol abuse detection, hands-on network packet analysis, Zeek scripting, flow data analysis, and real-world attack scenarios.

On-Demand $575.00

Course Length: 16 Hours

Includes a Certificate of Completion



Next scheduled date: WWHF Mile High 2026 - Link at bottom.

Description

This course covers incident handling fundamentals, attacker methodologies, network protocol abuse detection, hands-on network packet analysis, Zeek scripting, flow data analysis, and real-world attack scenarios.

Incident responders are continually faced with the challenge of collecting and analyzing relevant event data—network communications is no exception. This course uses an assortment of network data acquisition tools and techniques with a focus on open-source, vendor-neutral solutions. Students who take this course will learn how to perform network traffic and protocol analysis that ultimately supports cybersecurity incident response efforts.

From reconnaissance to data exfiltration, network traffic scales to provide a bird’s-eye view of attacker activity. Leveraging the vantage point of key network traffic chokepoints, this course explores nearly every phase of an attacker’s methodology. Students will learn network traffic analysis concepts and work through hands-on lab exercises that reinforce the course material using real-world attack scenarios.

System Requirements
  • Students will need to have all of the following resources to participate in all of the hands-on exercises (labs):
    • High-speed Internet sufficient for participating in a video conference/webinar
    • A computer with a minimum of 8GB RAM, 100GB of free disk space
    • System must be able to run an Ubuntu 20.04 LTS 64-bit VM with the following minimum specs: 4GB RAM, 60GB disk space, 2 virtual processors
    • VMWare Workstation/Player 16.x OR VMWare Fusion 12.x

FAQ

Who Should Take This Course
• Incident Responders
• SOC Analysts
• Digital Forensic Investigators
• Network Threat Hunters
• Information Technology/Security enthusiasts wanting to expand their knowledge on network traffic analysis
Audience Skill Level
• Familiarity with the OSI and TCP/IP models
• General understanding of common network protocols found in enterprise environments (DNS, HTTP, SMTP, etc.)
• 1-2 years of experience in network/security operations, incident response, or threat hunting
Student Requirements
The following prerequisites are recommended for students to successfully complete all of the hands-on exercises (labs):

• Students should be comfortable operating from the command-line in Debian-based Linux distributions such as Ubuntu
• Students should be comfortable opening network packet capture files with tools like Tcpdump, Wireshark/Tshark
• Students should be comfortable installing and running virtual machines on their computer
• Although programming experience is not a requirement, students should be comfortable editing and running scripts such as Bash and Python
What Each Student Should Bring
A laptop (see "System Requirements" for details)

About the Instructor

Pixel splash background
Troy Wojewoda
Troy Wojewoda
"purveyor of digital truths"
Bio

Troy Wojewoda is a Security Analyst at Black Hills Information Security (BHIS). Prior to joining BHIS, Troy has held roles in application and system administration, host and network intrusion detection, wireless security, penetration testing, digital forensics, malware analysis, threat hunting, and incident response. In addition to earning several professional certifications, Troy has a BS in Computer Engineering and Computer Science.

This class is being taught at Wild West Hackin’ Fest – Mile High 2026.

For more information about our conferences, visit Wild West Hackin’ Fest!

REGISTER HERE

Clicking on the button above will take you to our registration page

On-Demand

Antisyphon's On-Demand classes give you flexible, self-paced access to the same high-quality training our live events are known for. Whether you're diving into forensics, cloud security, or offensive tooling, each course includes:

  • Full access to video recordings, slides, and downloadable resources
  • Hands-on labs and virtual machines to reinforce real-world skills
  • Cyber Range access for immersive practice (select courses)
  • Dedicated Discord support from instructors and peers
  • Certificates of participation upon completion

Start learning when it works for you!
No deadlines, no pressure. Just real, practical cybersecurity training on your schedule.

Purchase:
Content is loading, please wait.
Shopping Cart

No products in the cart.