{"id":2207,"date":"2020-03-18T10:05:07","date_gmt":"2020-03-18T10:05:07","guid":{"rendered":"https:\/\/isf.tvz.hr\/?p=2207"},"modified":"2020-04-07T18:01:17","modified_gmt":"2020-04-07T18:01:17","slug":"network-forensics","status":"publish","type":"post","link":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/network-forensics\/","title":{"rendered":"Network Forensics"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\"  style='background-color: rgba(255,255,255,0);background-position: center center;background-repeat: no-repeat;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;'><div class=\"fusion-builder-row fusion-row \"><div  class=\"fusion-layout-column fusion_builder_column fusion_builder_column_1_3 fusion-builder-column-0 fusion-one-third fusion-column-first 1_3\"  style='margin-top:10px;margin-bottom:10px;width:33.33%;width:calc(33.33% - ( ( 4% ) * 0.3333 ) );margin-right: 4%;'><div class=\"fusion-column-wrapper\" style=\"padding: 0px 0px 0px 0px;background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;\"   data-bg-url=\"\"><span class=\"fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img loading=\"lazy\" src=\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/covjek_stoji_450.jpg\" data-orig-src=\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/covjek_stoji_450.jpg\" width=\"450\" height=\"686\" alt=\"\" title=\"covjek_stoji_450\" class=\"lazyload img-responsive wp-image-2264\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27450%27%20height%3D%27686%27%20viewBox%3D%270%200%20450%20686%27%3E%3Crect%20width%3D%27450%27%20height%3D%273686%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/covjek_stoji_450-200x305.jpg 200w, https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/covjek_stoji_450-400x610.jpg 400w, https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/covjek_stoji_450.jpg 450w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1000px) 100vw, 450px\" \/><\/span><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div  class=\"fusion-layout-column fusion_builder_column fusion_builder_column_2_3 fusion-builder-column-1 fusion-two-third fusion-column-last 2_3\"  style='margin-top:10px;margin-bottom:10px;width:66.66%;width:calc(66.66% - ( ( 4% ) * 0.6666 ) );'><div class=\"fusion-column-wrapper\" style=\"padding: 0px 0px 0px 0px;background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;\"   data-bg-url=\"\"><style type=\"text\/css\"><\/style><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"margin-top:0px;margin-bottom:30px;\"><h3 class=\"title-heading-left\" style=\"margin:0;color:#d20000;\">Semester 3 \/ ECTS Credits: 5 ECTS<\/h3><\/div><div class=\"fusion-text\"><h3>Course Description:<\/h3>\n<p>The main objective of this course is to give short and focused introduction to network forensics.<\/p>\n<p>Students will gain comprehensive knowledge and practical skills of the topics covered with theories, concepts, and hands-on exercises.<br \/>\nThroughout this course participants will gain advanced knowledge of network topology and elements, computer network sources of evidence and the forensic analysis of network artefacts. Participants will learn about the underlying principles of computer networks and enhance their ability to conduct forensic examinations of data collected from computer networks including network devices, servers and hosts.<\/p>\n<p>Practical skills will be obtained during lab work using Splunk and other network analysis tools by working on real-life scenarios.<\/p>\n<h3>Learning Outcomes:<\/h3>\n<ol>\n<li>Examine the computer network for the existence of digital traces.<\/li>\n<li>Critically assess the tools for monitoring computer networks.<\/li>\n<li>Critically understand the authentication and authorization process.<\/li>\n<li>Formulate\/shape the model of the topology of computer networks.<\/li>\n<li>Build reports on the conduct of digitally forensic investigation of computer networks.<\/li>\n<li>Combine the ISO OSI open system model.<\/li>\n<\/ol>\n<h3>Course content lectures:<\/h3>\n<ol>\n<li>Network types, network technologies, devices<\/li>\n<li>Internet history, basics of www<\/li>\n<li>Open system ISO\/OSI model<\/li>\n<li>Transmission Control Protocol\/Internet Protocol<\/li>\n<li>Confidentiality, integrity and availability, authentication, authorization and availability<\/li>\n<li>SID, Firewall<\/li>\n<li>Intrusion into system, detection and prevention<\/li>\n<li>Domain name system, network protocols<\/li>\n<li>Online Tools for Analysis Log: Splunk<\/li>\n<li>Linux Network Traffic Analysis Tools<\/li>\n<li>Wireshark online analysis and analysis of packages<\/li>\n<li>Case studies<\/li>\n<li>Investigation reports<\/li>\n<\/ol>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><style type=\"text\/css\">.fusion-fullwidth.fusion-builder-row-1 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link) , .fusion-fullwidth.fusion-builder-row-1 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link):before, .fusion-fullwidth.fusion-builder-row-1 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link):after {color: #d20000;}.fusion-fullwidth.fusion-builder-row-1 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link):hover, .fusion-fullwidth.fusion-builder-row-1 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link):hover:before, .fusion-fullwidth.fusion-builder-row-1 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link):hover:after {color: #d20000;}.fusion-fullwidth.fusion-builder-row-1 .pagination a.inactive:hover, .fusion-fullwidth.fusion-builder-row-1 .fusion-filters .fusion-filter.fusion-active a {border-color: #d20000;}.fusion-fullwidth.fusion-builder-row-1 .pagination .current {border-color: #d20000; background-color: #d20000;}.fusion-fullwidth.fusion-builder-row-1 .fusion-filters .fusion-filter.fusion-active a, .fusion-fullwidth.fusion-builder-row-1 .fusion-date-and-formats .fusion-format-box, .fusion-fullwidth.fusion-builder-row-1 .fusion-popover, .fusion-fullwidth.fusion-builder-row-1 .tooltip-shortcode {color: #d20000;}#main .fusion-fullwidth.fusion-builder-row-1 .post .blog-shortcode-post-title a:hover {color: #d20000;}<\/style>\n","protected":false},"excerpt":{"rendered":"<p>Semester 3 \/ ECTS Credits: 5 ECTS<\/p>\n","protected":false},"author":1,"featured_media":2417,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[21],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Network Forensics - TVZ - Information Security and Digital Forensics<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/network-forensics\/\" \/>\n<meta property=\"og:locale\" content=\"hr_HR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Network Forensics - TVZ - Information Security and Digital Forensics\" \/>\n<meta property=\"og:description\" content=\"Semester 3 \/ ECTS Credits: 5 ECTS\" \/>\n<meta property=\"og:url\" content=\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/network-forensics\/\" \/>\n<meta property=\"og:site_name\" content=\"TVZ - Information Security and Digital Forensics\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-18T10:05:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-04-07T18:01:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/semester_3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Napisao\/la\" \/>\n\t<meta name=\"twitter:data1\" content=\"webadmin1\" \/>\n\t<meta name=\"twitter:label2\" content=\"Procijenjeno vrijeme \u010ditanja\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuta\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/isf.tvz.hr\/#website\",\"url\":\"https:\/\/isf.tvz.hr\/\",\"name\":\"TVZ - Information Security and Digital Forensics\",\"description\":\"Study Programme\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/isf.tvz.hr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"hr\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/network-forensics\/#primaryimage\",\"inLanguage\":\"hr\",\"url\":\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/semester_3.jpg\",\"contentUrl\":\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/semester_3.jpg\",\"width\":800,\"height\":400},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/network-forensics\/#webpage\",\"url\":\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/network-forensics\/\",\"name\":\"Network Forensics - TVZ - Information Security and Digital Forensics\",\"isPartOf\":{\"@id\":\"https:\/\/isf.tvz.hr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/network-forensics\/#primaryimage\"},\"datePublished\":\"2020-03-18T10:05:07+00:00\",\"dateModified\":\"2020-04-07T18:01:17+00:00\",\"author\":{\"@id\":\"https:\/\/isf.tvz.hr\/#\/schema\/person\/10016457ba19578af899f6dfefacbf35\"},\"breadcrumb\":{\"@id\":\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/network-forensics\/#breadcrumb\"},\"inLanguage\":\"hr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/network-forensics\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/network-forensics\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/isf.tvz.hr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Network Forensics\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/isf.tvz.hr\/#\/schema\/person\/10016457ba19578af899f6dfefacbf35\",\"name\":\"webadmin1\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/isf.tvz.hr\/#personlogo\",\"inLanguage\":\"hr\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ea28ae2a1a9b191433250aaaffa620a3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ea28ae2a1a9b191433250aaaffa620a3?s=96&d=mm&r=g\",\"caption\":\"webadmin1\"},\"url\":\"https:\/\/isf.tvz.hr\/index.php\/author\/webadmin1\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Network Forensics - TVZ - Information Security and Digital Forensics","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/network-forensics\/","og_locale":"hr_HR","og_type":"article","og_title":"Network Forensics - TVZ - Information Security and Digital Forensics","og_description":"Semester 3 \/ ECTS Credits: 5 ECTS","og_url":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/network-forensics\/","og_site_name":"TVZ - Information Security and Digital Forensics","article_published_time":"2020-03-18T10:05:07+00:00","article_modified_time":"2020-04-07T18:01:17+00:00","og_image":[{"width":800,"height":400,"url":"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/semester_3.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Napisao\/la":"webadmin1","Procijenjeno vrijeme \u010ditanja":"5 minuta"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/isf.tvz.hr\/#website","url":"https:\/\/isf.tvz.hr\/","name":"TVZ - Information Security and Digital Forensics","description":"Study Programme","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/isf.tvz.hr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"hr"},{"@type":"ImageObject","@id":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/network-forensics\/#primaryimage","inLanguage":"hr","url":"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/semester_3.jpg","contentUrl":"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/semester_3.jpg","width":800,"height":400},{"@type":"WebPage","@id":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/network-forensics\/#webpage","url":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/network-forensics\/","name":"Network Forensics - TVZ - Information Security and Digital Forensics","isPartOf":{"@id":"https:\/\/isf.tvz.hr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/network-forensics\/#primaryimage"},"datePublished":"2020-03-18T10:05:07+00:00","dateModified":"2020-04-07T18:01:17+00:00","author":{"@id":"https:\/\/isf.tvz.hr\/#\/schema\/person\/10016457ba19578af899f6dfefacbf35"},"breadcrumb":{"@id":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/network-forensics\/#breadcrumb"},"inLanguage":"hr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/network-forensics\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/network-forensics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/isf.tvz.hr\/"},{"@type":"ListItem","position":2,"name":"Network Forensics"}]},{"@type":"Person","@id":"https:\/\/isf.tvz.hr\/#\/schema\/person\/10016457ba19578af899f6dfefacbf35","name":"webadmin1","image":{"@type":"ImageObject","@id":"https:\/\/isf.tvz.hr\/#personlogo","inLanguage":"hr","url":"https:\/\/secure.gravatar.com\/avatar\/ea28ae2a1a9b191433250aaaffa620a3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ea28ae2a1a9b191433250aaaffa620a3?s=96&d=mm&r=g","caption":"webadmin1"},"url":"https:\/\/isf.tvz.hr\/index.php\/author\/webadmin1\/"}]}},"_links":{"self":[{"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/posts\/2207"}],"collection":[{"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/comments?post=2207"}],"version-history":[{"count":5,"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/posts\/2207\/revisions"}],"predecessor-version":[{"id":2539,"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/posts\/2207\/revisions\/2539"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/media\/2417"}],"wp:attachment":[{"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/media?parent=2207"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/categories?post=2207"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/tags?post=2207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}