
In this 4-hour workshop we will introduce students to the core concepts of network forensics, including network architecture, packet analysis tools, and basic traffic analysis techniques.
Live Training $25 - $150
Course Length: 4 Hours
Includes a Certificate of Completion
Next scheduled date: July 25th, 2025 @ 11:00 AM EDT
Description
In this 4-hour workshop we will introduce students to the core concepts of network forensics, including network architecture, packet analysis tools, and basic traffic analysis techniques.
Hands-on labs have been created with real-world scenarios that are used to reinforce the training material.
By the end of the session, students will have a solid understanding of network forensic fundamentals, be familiar with key tools, and gain hands-on experience in analyzing network traffic.
System Requirements
-
Student/Lab Requirements:
- A system with a browser and solid internet connection
- The ability to register via MetaCTF. Attendees will have access to the course VM and Labs via the MetaCTF platform for the duration of the workshop.
Syllabus
Module 1: Introduction to Network Forensics
-
- Lecture Topics:
-
- Course overview and objectives
-
- Network architecture: key components, design considerations, and security implications
-
- Types of network artifacts (e.g., logs, packet captures) and methods of acquisition
-
- Lecture Topics:
Module 2: Tools of the Trade
-
- Lecture Topics:
-
- Introduction to packet capture and filtering using tcpdump and ngrep
-
- Overview of Wireshark and TShark for packet analysis
-
- Key filtering techniques for isolating relevant traffic
-
- Introduction to Zeek log analysis
-
- Lecture Topics:
Module 3: Hands-On Lab – Traffic Analysis, Filtering, and Data Extraction
-
- Lab Activity:
-
- Students will use Wireshark and tcpdump to capture and analyze sample network traffic
-
- Practice applying filters to identify suspicious activity
-
- Extract relevant data for further analysis and/or data stacking
-
- Analyzing Zeek log
-
- Lab Activity:
Module 4: Protocols and Threats
-
- Lecture Topics:
-
- Overview of common network protocols (HTTP, DNS, TCP/IP, etc.)
-
- Introduction to encrypted traffic and its challenges in analysis
-
- Examples of attacker techniques and how they exploit network protocol
-
- Lecture Topics:
FAQ
About the Instructor

Troy Wojewoda
"purveyor of digital truths"Bio
Troy Wojewoda is a Security Analyst at Black Hills Information Security (BHIS). Prior to joining BHIS, Troy has held roles in application and system administration, host and network intrusion detection, wireless security, penetration testing, digital forensics, malware analysis, threat hunting, and incident response. In addition to earning several professional certifications, Troy has a BS in Computer Engineering and Computer Science.
Register for Upcoming
-
Filter by Product Instructor
-
Filter by Product Date
-
Filter by Product Type
Workshop: Foundations of Network Forensics and Analysis with Troy Wojewoda
Complete Package
Live Training Troy Wojewoda
Virtual
Certificate of participation, six months access to class recordings and our appreciation.
Pay Forward What You Can
Live Training Troy Wojewoda
Virtual
Certificate of participation, six months access to class recordings and our appreciation.
Pay Forward What You Can
Live Training Troy Wojewoda
Virtual
Certificate of participation, six months access to class recordings and our appreciation.
Pay Forward What You Can
Live Training Troy Wojewoda
Virtual
Certificate of participation, six months access to class recordings and our appreciation.
Pay Forward What You Can
Live Training Troy Wojewoda
Virtual
Certificate of participation, six months access to class recordings and our appreciation.
Similar Courses
-
Multiple InstructorsLive
Workshop: The OWASP API Security Top Ten 2023 with Tanya Janca
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLive
Workshop: Offensive Tooling Foundations with Chris Traynor
View Course -
Multiple InstructorsLive
Workshop: Introduction to Cloud Security with Beau Bullock
View Course -
Multiple InstructorsLive
Workshop: Exploiting AI with Ben Bowman
View Course This product has multiple variants. The options may be chosen on the product page