Learn to analyze network traffic, email headers, social media investigations, CDR/IPDR analysis, IP tracing, and network log analysis to track cyber criminals.
By completing this module, you will gain the following competencies
Understand TCP/IP protocol, OSI model, and network communication fundamentals
Analyze email headers to identify spoofing and phishing attacks
Use OSINT techniques for social media investigation
Analyze CDR and IPDR data and perform tower location mapping
Perform IP tracing, WHOIS lookup, and geo-location techniques
Analyze firewall, server, and router logs to identify anomalies
Complete all 6 parts before attempting the module quiz
Learn the fundamentals of networking - TCP/IP protocol, OSI model, IP addresses (IPv4, IPv6), DNS, DHCP, and how data travels across networks.
Understand email header analysis techniques, identify spoofed emails, investigate phishing attacks, and analyze mailbox contents for digital evidence.
Learn OSINT techniques for social media investigation, profile analysis, and how to recover artifacts from Facebook, Instagram, and WhatsApp.
Understand what CDR is and how to obtain it, learn CDR fields, IPDR analysis techniques, and tower location mapping for tracking suspects.
Learn IP address tracing techniques, WHOIS lookup methods, VPN and proxy detection, and geo-location methods for cyber crime investigation.
Learn to analyze firewall logs, server logs, and router logs to identify anomalies and track malicious activities in network traffic.
Complete all 6 parts to unlock the module quiz. Test your understanding of network forensics, email analysis, CDR/IPDR, and log analysis concepts.
Take Quiz