- Foundations of Network Forensics
- Protocols and Deep Packet Analysis
- Flow Analysis versus Packet Analysis
- Conducting Log Analysis
- Wireless Forensics
- TLS Decryption and Visibility
- Demystifying Covert Channels
- Analyzing Exploit Kits
- Automating Network Forensics
- Backtracking Malware
- Investigating Ransomware Attacks
- Investigating Command and Control Systems
- Investigating Attacks on Email Servers
- Investigating Web Server Attacks