With the rise of data breaches, it is important for those interested in the information security field to understand how to identify malicious attacks in network files along with system log files. Unlike computer and mobile forensics, the evidence in network forensics can be easily modified and harder to be admissible in court. Therefore, this class briefly explains the importance of log files and goes into hands-on exercises and scenarios. This class focuses on network forensics and incident response.