This document provides an overview of email forensics techniques and tools used in network forensics investigations. It discusses the typical architecture of email systems and protocols like SMTP, POP, and IMAP. Key points covered include email headers, the information contained in Received headers, and how an email travels from sender to recipient through various mail servers. Spoofing emails is also briefly explained. The document aims to introduce investigators to analyzing email evidence at different layers of the network and tools needed for forensic analysis of email messages and server logs.