Live webcast: Network forensics with Sherri Davidoff and Jonathan Ham

Sherri Davidoff and Jonathan Ham recently discussed their new book ‘Network Forensics’ and answered questions.

Editor's note: Download the webcast slides here. Or view the archived version of the full webcast here.

About this webcast:
Despite the massive size of today's Internet and the millions of miles network data packets travel every millisecond, each one of those packets leaves a mark -- in routers, firewalls, Web proxies, and within enterprise networks. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind. But do you know the tools and techniques needed to find it?

In this live SearchSecurity.com webcast, learn how enterprise network security teams can recognize hackers’ tracks and uncover network-based evidence of digital crime. Experts Sherri Davidoff and Jonathan Ham, co-authors of the new Prentice Hall book, “Network Forensics: Tracking Hackers through Cyberspace”, shared secrets they've learned conducting real incident-response interventions and digital forensics investigations. 

Davidoff and Ham also answered questions about network forensics questions. One lucky participant received a free copy of “Network Forensics: Tracking Hackers through Cyberspace”.

About the experts: 
Sherri Davidoff and Jonathan Ham are security consultants with Lake Missoula Group, LLC. They specialize in penetration testing, network assessments, forensics, and incident response. 

This was first published in June 2012

Dig deeper on Monitoring Network Traffic and Network Forensics

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close