Network Forensic Analysis Manager

NFAM Self-Study Vyber Security Course

The Network Forensic Analysis Manager self-study course was originally developed for the U.S. government, and has now been made available to city, county, and state law enforcement agencies. Civilian personnel outside of the law enforcement community are also authorized to attend and will receive practical training for their business environments.

This comprehensive course brings incident response and network forensic core competencies to advanced levels by presenting students with 12 detailed learning objectives. Students will be provided with both experiential knowledge and practical skills that simulate real-world scenarios, investigations, and recovery of evidentiary data in systems and networks. With a specific focus on the centralizing and investigating of logging systems and network devices, students will cover topics such as: Incident Response Management; Live Data Collection; Analysis Methodology; Malware Triage; and, practical lab exercises utilizing the Wireshark packet capturing tool for network investigations.

Hard Copy Course Materials

The Network Forensic Analysis Manager self-study course was originally developed for the U.S. government, and has now been made available to city, county, and state law enforcement agencies. Civilian personnel outside of the law enforcement community are also authorized to attend and will receive practical training for their business environments. This comprehensive course brings incident response and network forensic core competencies to advanced levels by presenting students with 12 detailed learning objectives. Students will be provided with both experiential knowledge and practical skills that simulate real-world scenarios, investigations, and recovery of evidentiary data in systems and networks. With a specific focus on the centralizing and investigating of logging systems and network devices, students will cover topics such as: Incident Response Management; Live Data Collection; Analysis Methodology; Malware Triage; and, practical lab exercises utilizing the Wireshark packet capturing tool for network investigations.
COURSE TEXTBOOK
NFAM Self-Study Lab Textbook
LAB TEXTBOOK
NFAM Self-Study Lab Textbook
COURSE WORKBOOK
NFAM Self-Study Prep Guide
EXAM PREP GUIDE

Online Course Materials

All Phase2 self-study courses offer the following online resources and/or support:

  • Domain Knowledge Assessment Quizzes
  • Course Workbook and Lab Exercises
  • Exam Prep Guide
  • Lab Images and Files (Applicable Courses)
  • Instructor Support During Enrollment (by Email)

Course Outline and Learning Objectives

  • Network Forensics vs. Digital Forensics
  • What Constitutes an Incident?
  • The Incident Response Life Cycle
  • What is Incident Response?
  • Concept of the Attack Life Cycle
  • 7 Stages of the Attack Life Cycle
  • Common Security Incidents
  • Goals of Incident Response
  • Incident Response Team Considerations
  • Indicators of Compromise (IOC)
  • Analyzing Data Evidence
  • Tracking Investigative Information
  • Defining the Network Forensic Mission
  • Internal Communication Procedures
  • External Communication Procedures
  • Forensic Team Deliverables
  • Building a Field Forensic System
  • Preparing the Infrastructure
  • Time Zones and Investigative Timelines
  • Collecting Initial Facts
  • Network and Incident Checklists
  • Maintaining Case Notes
  • Building an Attack Timeline
  • Defining Leads of Value
  • Turning Leads into Indicators
  • The Life Cycle of Indicator Generation
  • Indicator Verification
  • Resolving Internal Leads
  • Reporting Findings to Law Enforcement
  • When to Perform a Live Response
  • Live Response Challenges
  • Selecting a Live Response Tool
  • Data Collection Considerations
  • Common Live Response Data
  • Collection Best Practices
  • The Case for Network Monitoring
  • Types of Network Monitoring
  • Setting Up a Network Monitoring System
  • Network Surveillance
  • Network Sensor Deployment
  • Network Logging Challenges
  • Enterprise Services
  • Dynamic Host Configuration Protocol
  • Domain Name System
  • Enterprise Management Applications
  • Antivirus Software
  • Web Servers
  • General Process for Performing Analysis
  • Available Sources of Data
  • Outlining the Analysis Approach
  • Selection of Analysis Methods
  • Special Considerations for Artifacts
  • Evaluating Analysis Results
  • Malware Triage Concepts
  • Malware Handling Procedures
  • Malware Distribution and Documentation
  • Physical and Virtual Triage Environments
  • Automated, Manual, Static, and Dynamic Analysis
  • Malware Runtime Monitoring
  • Effective Incident Remediation
  • Assigning a Remediation Owner
  • Remediation Posturing Actions
  • Eradication Plan Development
  • Plan Timing and Execution
  • Strategic Recommendations and Lessons Learned
  • Virtual Machine Setup in Kali Linux
  • The Wireshark User Interface
  • Customizing Wireshark Settings
  • Applying Capture Filters
  • Applying Display Filters
  • Color Rules and Packet Export
  • Creating Tables and Graphs
  • File and Object Reassembly
  • Adding Comments to Trace Files
  • Command-Line Capture Tools

Certificate of Course Completion

A Certificate of Course Completion (shown below) will be available for download in PDF format immediately upon successful completion of the 16 domain knowledge assessment quizzes.  Replacement certificates can be requested by email at any time after the successful completion of the self-study course at no cost.

NFAM Certificate of Course Completion

Course Cost

$1,200.00

Phase2 Advantage offers discounts to non-profit organizations, federal agencies, law enforcement personnel, and the military affiliate community. We also offer group discounts. Email training@phase2advantage.com to see if your organization qualifies for one or more of our discount programs.