| Course Status : | Upcoming |
| Course Type : | |
| Language for course content : | English |
| Duration : | 12 weeks |
| Category : |
|
| Credit Points : | 4 |
| Level : | Diploma |
| Start Date : | 26 Jan 2026 |
| End Date : | 30 Apr 2026 |
| Enrollment Ends : | 28 Feb 2026 |
| Exam Date : | |
| Translation Languages : | English |
| NCrF Level : | 4.5 — 5.5 |
| Industry Details : | Education and Training |
|
swayam@nitttrc.edu.in, swayam@nitttrc.ac.in
UNIT 1:
Review of Networking concepts and Protocols, Introduction to Network Forensics, various aspects of Network Forensics.
UNIT 2:
Introduction to Network Forensic Tools and techniques: Wireshark, TCP Dump, Syslog, NMS, Promiscuous Mode, Network Port Mirroring, snooping, scanning tools, etc.
UNIT 3:
Understanding and Examining Data Link Layer, Physical Layer, Ethernet Switch Logs, MAC Table, ARP Table, etc. Understanding and Examining Network Layer, Router Logs, WiFi Device logs, Firewall logs
UNIT 4:
Understanding audit features of OS and applications; Enabling and Examining Server logs, User activity logs, Browser history analysis, Proxy server logs, Antivirus logs, Email logs
UNIT 5:
Limitations and challenges of network forensics due to encryption, spoofing, mobility, storage limitations, privacy laws, etc.
Manuals of OS, application software, network devices
RFCs of various networking protocols (https://www.ietf.org/)
Handbook of Digital Forensics and Investigation, Eoghan Casey, Elsevier Academic Press
Cyber Forensics, Albert Marcella and Doug Menendez, CRC Press
Computer Forensics (5 volume Set) mapping to CHFI (Certified Hacking Forensics Investigator), by EC-Council

As an Assistant Professor at NITTTR, Chennai, I bring over Fifteen years of expertise in technical education, curriculum development, and digital transformation initiatives. My leadership advocating digital accessibility, and mentoring educators on emerging technologies reflects my dedication to innovation in education.
With a Ph.D. in Security and expertise, Artificial Intelligence, Mobile Ad hoc Networks, Machine Learning, and Network Security, I have guided numerous impactful projects and authored over 10 publications in prestigious journals and conferences. My comprehensive understanding of Network Forensics has enabled me to design and implement effective methodologies for capturing, analyzing, and interpreting network traffic to optimize incident investigation. This expertise extends to developing advanced strategies for packet inspection, log analysis, and correlation of multi-layer evidence to enhance the accuracy and efficiency of forensic examinations.
DOWNLOAD APP
FOLLOW US