1. Foundations of Network Forensics
  2. Protocols and Deep Packet Analysis
  3. Flow Analysis versus Packet Analysis
  4. Conducting Log Analysis
  5. Wireless Forensics
  6. TLS Decryption and Visibility
  7. Demystifying Covert Channels
  8. Analyzing Exploit Kits
  9. Automating Network Forensics
  10. Backtracking Malware
  11. Investigating Ransomware Attacks
  12. Investigating Command and Control Systems
  13. Investigating Attacks on Email Servers
  14. Investigating Web Server Attacks