{"id":381,"date":"2011-05-24T00:12:32","date_gmt":"2011-05-23T22:12:32","guid":{"rendered":"http:\/\/it-news-blog.com\/?p=381"},"modified":"2019-04-29T17:58:37","modified_gmt":"2019-04-29T15:58:37","slug":"webcast-netzwerkanalyse-vs-datenforensik","status":"publish","type":"post","link":"https:\/\/it-news-blog.com\/?p=381","title":{"rendered":"Webcast &#8211; Netzwerkanalyse vs. Datenforensik"},"content":{"rendered":"<p><strong>am 20 September 2011 ab 15:00 Uhr &#8211; Der <strong>Online Webcast &#8211; Netzwerkanalyse vs. Datenforensik<\/strong><\/strong><\/p>\n<p>Erleben Sie eine bis dato, noch nie dagewesene \u00f6ffentliche Diskussion \u00fcber die Netzwerkanalyse und der Netzwerkforensik. Anerkannte Brachen-Experten halten den Daumen in\u00a0die Wunde und diskutieren auf h\u00f6chsten technischen Niveau, \u00fcber die Ansatzpunkte,\u00a0M\u00f6glichkeiten und vor allem gr\u00f6\u00dften Unterschiede der einzelnen Kernkompetenzen.<\/p>\n<p><strong>AGENDA<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>I.)\u00a0\u00a0Einf\u00fchrung<\/strong><\/p>\n<p>Netzwerktechnologien und Datentechnologien.<\/p>\n<p><strong>II.) <\/strong><strong>Arbeitsweisen der Netzwerkanalyse \/-Forensik.<\/strong><\/p>\n<p><em>Einleitung: Netzwerkmonitoring und Netzwek\u00fcberwachung.<\/em><\/p>\n<p><em>&gt; <\/em>Rechtlicher Hintergrund (Stichwort: Datenschutz).<\/p>\n<p>&gt; Identifikation und Dokumentation von Anomalien.<\/p>\n<p>&gt; Vorgehensweisen in Cloud Computing und \u201evirtuellen Welten\u201c<\/p>\n<p><strong>III.)\u00a0\u00a0Methoden der Netzwerkanalyse \/-Forensik.<\/strong><\/p>\n<p>Einleitung: die klassische Analyse und heutige Rekonstruktionsm\u00f6glichkeiten.<\/p>\n<p>&gt; Unterscheidung zwischen Datenanalyse und Rekonstruktion.<\/p>\n<p>&gt; Ansatzpunkt: Carving und semantische Analyse (Forensik)<\/p>\n<p>&gt; Anastzpunkt: Hardware- und Sotwarefilterung (Netzwerkanalyse)<\/p>\n<p><strong>IV.)\u00a0\u00a0Abschluss und Diskussionsrunde der Experten<\/strong><\/p>\n<p>&gt; DLP (Data Lost Prevention) Unsinn oder Zukunft<\/p>\n<p>&gt; Blick auf neue Technologien und Ihre Herausforderungen.<\/p>\n<p>&gt; 10 Fragen und 10 Antworten aus der Praxis f\u00fcr die Praxis<\/p>\n<p>Am Ende des Webcast, stehen Ihnen die Experten via Twitter (@hexcom_de),<\/p>\n<p>f\u00fcr eine Stunde zu pers\u00f6nlichen Verf\u00fcgung und beantworten Ihnen Ihre Fragen.<\/p>\n<p><strong>Referenten:<\/strong><\/p>\n<p><a href=\"http:\/\/www.marko-rogge.de\/\" target=\"_blank\" rel=\"noopener noreferrer\">Marko Rogge<\/a> (Sicherheitsexperte und Forensiker)<\/p>\n<p><a href=\"http:\/\/www.hexcom.de\/\" target=\"_blank\" rel=\"noopener noreferrer\">Patrick Petersson<\/a> (Gr\u00fcnder des gr\u00f6\u00dften deutschsprachigen Wireshark Forum)<\/p>\n<p><a href=\"http:\/\/www.tec4net.de\/\" target=\"_blank\" rel=\"noopener noreferrer\">Matthias Walter<\/a> (IT-Sachverst\u00e4ndiger und Datenschutzauditor)<\/p>\n<p><strong>Mit freundlicher Unterst\u00fctzung von<\/strong><\/p>\n<p><strong><em>&#8211; <\/em><\/strong><a href=\"http:\/\/www.admin-magazin.de\/\" target=\"_blank\" rel=\"noopener noreferrer\">ADMIN \u2013 MAGAZIN<\/a> <strong><em>&#8211;<\/em><\/strong> <a href=\"https:\/\/www.xing.com\/net\/itconnection\" target=\"_blank\" rel=\"noopener noreferrer\">IT Connection Forum Xing<\/a> <strong><em>&#8211;<\/em><\/strong> <a href=\"https:\/\/www.xing.com\/net\/wireshark\" target=\"_blank\" rel=\"noopener noreferrer\">Wireshark Forum Xing<\/a> <strong>&#8211; <\/strong><a href=\"IT-Exchange-M\u00fcnchen\" target=\"_blank\" rel=\"noopener noreferrer\">IT-Exchange-M\u00fcnchen<\/a><strong> &#8211;<\/strong><\/p>\n<p><strong>Anmeldung unter:<\/strong><br \/>\n<a href=\"http:\/\/www.hexcom.de\/home\/netzwerkanalyse-vs-datenforensik\/\">http:\/\/www.hexcom.de\/home\/netzwerkanalyse-vs-datenforensik\/<\/a><\/p>\n<p>\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014<\/p>\n<p><strong>Matthias Walter,<\/strong> <a title=\"http:\/\/www.tec4net.com\" href=\"http:\/\/www.tec4net.com\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.tec4net.com<br \/>\n<\/a>EDV-Sachverst\u00e4ndiger und Datenschutzauditor<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Erleben Sie eine bis dato, noch nie dagewesene \u00f6ffentliche Diskussion \u00fcber die Netzwerkanalyse und der Netzwerkforensik. Anerkannte Brachen-Experten halten den Daumen in die Wunde und diskutieren auf h\u00f6chsten technischen Niveau, \u00fcber die Ansatzpunkte, M\u00f6glichkeiten und vor allem gr\u00f6\u00dften Unterschiede der einzelnen Kernkompetenzen.<\/p>\n","protected":false},"author":2,"featured_media":1500,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[7],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Webcast - Netzwerkanalyse vs. Datenforensik - IT-NEWS-BLOG<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/it-news-blog.com\/?p=381\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Webcast - Netzwerkanalyse vs. Datenforensik - IT-NEWS-BLOG\" \/>\n<meta property=\"og:description\" content=\"Erleben Sie eine bis dato, noch nie dagewesene \u00f6ffentliche Diskussion \u00fcber die Netzwerkanalyse und der Netzwerkforensik. Anerkannte Brachen-Experten halten den Daumen in die Wunde und diskutieren auf h\u00f6chsten technischen Niveau, \u00fcber die Ansatzpunkte, M\u00f6glichkeiten und vor allem gr\u00f6\u00dften Unterschiede der einzelnen Kernkompetenzen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/it-news-blog.com\/?p=381\" \/>\n<meta property=\"og:site_name\" content=\"IT-NEWS-BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2011-05-23T22:12:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-04-29T15:58:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/it-news-blog.com\/wp-content\/uploads\/2011\/05\/tec4net_webcast.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Matthias Walter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matthias Walter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/it-news-blog.com\/?p=381\",\"url\":\"https:\/\/it-news-blog.com\/?p=381\",\"name\":\"Webcast - Netzwerkanalyse vs. Datenforensik - IT-NEWS-BLOG\",\"isPartOf\":{\"@id\":\"https:\/\/it-news-blog.com\/#website\"},\"datePublished\":\"2011-05-23T22:12:32+00:00\",\"dateModified\":\"2019-04-29T15:58:37+00:00\",\"author\":{\"@id\":\"https:\/\/it-news-blog.com\/#\/schema\/person\/e0c100c6b645f34e659beeb06e2295fc\"},\"breadcrumb\":{\"@id\":\"https:\/\/it-news-blog.com\/?p=381#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/it-news-blog.com\/?p=381\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/it-news-blog.com\/?p=381#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/it-news-blog.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Webcast &#8211; Netzwerkanalyse vs. Datenforensik\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/it-news-blog.com\/#website\",\"url\":\"https:\/\/it-news-blog.com\/\",\"name\":\"IT-NEWS-BLOG\",\"description\":\"Ein Service der tec4net GmbH\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/it-news-blog.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"de\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/it-news-blog.com\/#\/schema\/person\/e0c100c6b645f34e659beeb06e2295fc\",\"name\":\"Matthias Walter\",\"sameAs\":[\"https:\/\/tec4net.com\"],\"url\":\"https:\/\/it-news-blog.com\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Webcast - Netzwerkanalyse vs. Datenforensik - IT-NEWS-BLOG","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/it-news-blog.com\/?p=381","og_locale":"de_DE","og_type":"article","og_title":"Webcast - Netzwerkanalyse vs. Datenforensik - IT-NEWS-BLOG","og_description":"Erleben Sie eine bis dato, noch nie dagewesene \u00f6ffentliche Diskussion \u00fcber die Netzwerkanalyse und der Netzwerkforensik. Anerkannte Brachen-Experten halten den Daumen in die Wunde und diskutieren auf h\u00f6chsten technischen Niveau, \u00fcber die Ansatzpunkte, M\u00f6glichkeiten und vor allem gr\u00f6\u00dften Unterschiede der einzelnen Kernkompetenzen.","og_url":"https:\/\/it-news-blog.com\/?p=381","og_site_name":"IT-NEWS-BLOG","article_published_time":"2011-05-23T22:12:32+00:00","article_modified_time":"2019-04-29T15:58:37+00:00","og_image":[{"width":960,"height":400,"url":"https:\/\/it-news-blog.com\/wp-content\/uploads\/2011\/05\/tec4net_webcast.jpg","type":"image\/jpeg"}],"author":"Matthias Walter","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Matthias Walter","Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/it-news-blog.com\/?p=381","url":"https:\/\/it-news-blog.com\/?p=381","name":"Webcast - Netzwerkanalyse vs. Datenforensik - IT-NEWS-BLOG","isPartOf":{"@id":"https:\/\/it-news-blog.com\/#website"},"datePublished":"2011-05-23T22:12:32+00:00","dateModified":"2019-04-29T15:58:37+00:00","author":{"@id":"https:\/\/it-news-blog.com\/#\/schema\/person\/e0c100c6b645f34e659beeb06e2295fc"},"breadcrumb":{"@id":"https:\/\/it-news-blog.com\/?p=381#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/it-news-blog.com\/?p=381"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/it-news-blog.com\/?p=381#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/it-news-blog.com\/"},{"@type":"ListItem","position":2,"name":"Webcast &#8211; Netzwerkanalyse vs. Datenforensik"}]},{"@type":"WebSite","@id":"https:\/\/it-news-blog.com\/#website","url":"https:\/\/it-news-blog.com\/","name":"IT-NEWS-BLOG","description":"Ein Service der tec4net GmbH","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/it-news-blog.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de"},{"@type":"Person","@id":"https:\/\/it-news-blog.com\/#\/schema\/person\/e0c100c6b645f34e659beeb06e2295fc","name":"Matthias Walter","sameAs":["https:\/\/tec4net.com"],"url":"https:\/\/it-news-blog.com\/?author=2"}]}},"_links":{"self":[{"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/posts\/381"}],"collection":[{"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=381"}],"version-history":[{"count":7,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/posts\/381\/revisions"}],"predecessor-version":[{"id":1502,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/posts\/381\/revisions\/1502"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/media\/1500"}],"wp:attachment":[{"href":"https:\/\/it-news-blog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=381"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=381"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}