- Course type: Self-paced
- Available Lessons: 71
- Average Lesson Length: 8 min
- New lessons are still being added
Watch a preview:chapter 1 / lesson 1Types of Networks: LAN, WAN, WLAN, MAN, SAN, PAN, EPN & VPN
Course SummaryThe entertaining lessons in this Computer Science 336 course can help you quickly gain a quality understanding of network forensics. The lessons, along with short quizzes and chapter exams, can improve your ability to succeed on assignments, projects or tests in school or on the job.
To Start This Course Today
Try it free for 5 days
About This Course
In this Computer 336 course is a comprehensive overview of network forensics, designed to get you up to speed with network protocols, network threats and security, digital forensics and so much more. Our instructors have developed bite-sized lessons that are easy to navigate and fun to review. These lessons offer in-depth analyses of concepts like theft as a digital crime, reverse engineering in digital forensics and computer virus remediation. Assessment options like multiple-choice quizzes, chapter exams and a final course exam make it easy to test your knowledge of these concepts and gauge your overall progress. These study tools are available 24 hours a day via your computer, smartphone or tablet, enabling you to align your study sessions with your personal schedule.
Individuals who can benefit from this course include students, educators and professionals in the field. Students can use the lessons, quizzes and exams to learn concepts for the first time or refresh their existing knowledge while studying for a test or working on an assignment or project. Educators can use these study materials as supplementary learning tools in the classroom. Professionals can use this course to brush up on their current knowledge and make advancements in their careers.
|Network Components||Discusses different types of networks, telecommunications hardware, network nodes and the network interface card (NIC).|
|Network Protocols Overview||Defines network protocols, Post Office Protocol (POP), Simple Mail Transfer Protocol (SMTP) and Internet Message Access Protocol (IMAP). Describes the application, session, presentation, data link and physical layers of the OSI model.|
|Network Security Fundamentals||Lists types of network security and explains its importance. Offers explanations of network security design, risk assessments, audits and policies.|
|Network Threats & Digital Crimes||Explains computers as a means of cybercrime, types of attacks in network security, cybersecurity vulnerabilities and the damage of intellectual capital. Describes attacks, espionage and vandalism in digital crime.|
|Network Forensic Analysis||Teaches ways to monitor a network for anomalous traffic, analyze network event logs, identify intrusions, search for keywords and parse human communications in network forensic analysis.|
|Network Forensic Investigations||Covers digital forensics software, evidence in digital crimes and the impact of network type on network forensic investigations. Outlines how to undo the deletion of data, handle digital evidence and conduct computer investigations.|
|Traffic Analysis in Network Forensics||Offers an overview of network traffic analysis, network scanners and network traffic flows and sessions. Explains how to capture network traffic, use sniffers in monitoring networks and detect network and port scans.|
|Detecting & Preventing Network Intrusions||Describes the intrusion detection system (IDS), intrusion prevention system (IPS), firewall in network security and proxy server.|
|Email & Digital Forensics||Explores the role of email headers in digital forensics investigations and how to trace emails and email servers. Discusses email in digital forensics and digital forensics laws.|
|Virus & Malware Detection||Defines computer virus remediation, advanced malware, mobile malware and malware analysis. Lists methods for detecting computer viruses.|
|Network Encryption Overview||Discusses basic encryption methods, IPSec vs. SSL, RSA algorithms, AES and DES. Defines public key encryption, SSH proxy tunnels, symmetric encryption and HTTPS encryption.|
|Incident Response in Network Forensics||Explains the purpose of first responders and breach control in network forensics. Describes the digital forensics lab and how to create evidence reports in network forensics.|
Earning College Credit
Did you know… We have over 160 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Research Schools, Degrees & Careers
Get the unbiased info you need to find the right school.
Browse Articles By Category
Browse an area of study or degree level.
- Biological and Biomedical Sciences
- Communications and Journalism
- Computer Sciences
- Culinary Arts and Personal Services
- Liberal Arts and Humanities
- Mechanic and Repair Technologies
- Medical and Health Professions
- Physical Sciences
- Transportation and Distribution
- Visual and Performing Arts
- Can Short Video Lessons Help Your ADHD Child Study Better?
- Forensic Science Courses in Oklahoma with School Information
- Top School with Courses in Computer Networking - Morrisville, NC
- List of Free Guitar Courses and Lessons
- Online Computer Science Courses, Classes and Schools
- Computer Science Schools in Alabama with Course Overviews
- Computer Science Courses in Utah with School Overviews
- 5 Techniques That Can Help You Improve Your Employees' Ability to Learn
- Strategies to Help Your ADHD Child Succeed at School
- Top Schools for Forensic Science
- Answers and detailed explanations to each question
- Video lessons to explain complicated concepts
Explore our library of over 75,000 lessons
- College Courses
- High School Courses
- Other Courses