RCCE Course
Course #470

Network forensics Operations Playbook

📊 Level: Beginner
⏱️ Duration: 2 Days
🏷️ Track: DFIR
📋 Prerequisites: None
🖥️ Mode: Online Instructor-Led
📝 Course Description

RCCE students will learn network forensic capture and analysis including full packet capture, network flow analysis, protocol reconstruction, network-based artifact extraction, and network timeline construction. RCCE students will learn to deploy network capture infrastructure for forensic purposes, collect full packet captures and network flow data during incident investigations, reconstruct network sessions and extract transferred files, analyze DNS queries, HTTP transactions, and encrypted traffic metadata, detect data exfiltration patterns through network forensics, build network-based attack timelines, and produce network forensic reports that complement host-based investigation findings. This operations-focused course delivers production-ready playbooks, checklists, and standard operating procedures. Starting from foundational concepts, RCCE students will learn to build repeatable day-to-day operational workflows that ensure consistency and quality. Students receive templates and frameworks they can customize and deploy immediately in their security operations, reducing time to operational effectiveness.

🎯 Target Audience
  • Security Engineers building defensive controls
  • Security Analysts and Blue Team members
  • Systems Administrators with security responsibilities
  • GRC and Risk Professionals supporting controls
  • Professionals implementing Network forensics Operations Playbook
🧠 What You Will Learn
  • Execute hands-on tasks for network forensics
  • Execute hands-on tasks for operations playbook
  • Explain Module Overview: Network Forensics Operations fundamentals
  • Execute hands-on tasks for what you will learn — covering Deploy network capture infrastructure.
  • Execute hands-on tasks for operational focus — covering Production-ready playbooks and SOPs.
  • Execute hands-on tasks for prerequisites & audience — covering Beginner DFIR professionals and SOC analysts.
  • Execute hands-on tasks for topic map: 18 core subtopics
  • Execute hands-on tasks for 1. forensics fundamentals
  • Execute hands-on tasks for 2. legal & compliance
  • Execute hands-on tasks for 3. capture infrastructure
  • Execute hands-on tasks for 4. full packet capture
  • Execute hands-on tasks for 5. flow data collection
📚 Course Outline
Module 01Network Forensics
Module 02Operations Playbook
Module 03Module Overview: Network Forensics Operations
Module 04What You Will Learn
Module 05Operational Focus
Module 06Prerequisites & Audience
Module 07Topic Map: 18 Core Subtopics
Module 081. Forensics Fundamentals
Module 092. Legal & Compliance
Module 103. Capture Infrastructure
Module 114. Full Packet Capture
Module 125. Flow Data Collection
Module 136. Protocol Reconstruction
Module 149. Encrypted Traffic Metadata
🧪 Lab Details

All hands-on labs run on Rocheston Rose X OS. Students practice network forensics operations playbook by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.

  • Lab 1: Execute hands-on tasks for network forensics
  • Lab 2: Execute hands-on tasks for operations playbook
  • Lab 3: Explain Module Overview: Network Forensics Operations fundamentals
  • Lab 4: Execute hands-on tasks for what you will learn
  • Lab 5: Execute hands-on tasks for operational focus
📊 Skill Level
Beginner
Beginner Intermediate Advanced Expert
Duration
2 Days
🎓
Certificate
Completion
🖥️
Lab Platform
Rose X OS
👨‍🏫
Mode of Training
Online Instructor-Led
🔥
Platform
Zelfire
🐦‍⬛
Cyber Range
Raven
📓
Study Material
CyberNotes
🏆 Certificate

Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Network forensics Operations Playbook, verifiable through the Rocheston certification portal.

🔑 Student Access & Materials
  • Full access to all course materials and slide decks
  • Hands-on lab access on Rocheston Rose X OS environment
  • Access to Rocheston CyberNotes
  • Access to Rocheston Zelfire — EDR/XDR SIEM platform
  • Access to Rocheston Raven — online cyber range exercise platform
  • Access to Rocheston Vulnerability Vines AI