Analyze the differences between incident response and network forensics. Analyze the impact of existing network security controls on network forensics. Identify the tools that are available for effective network forensics investigations. Explore common methodologies used in network forensics.