Digital Forensics and Incident Response
Understanding Incident Response
1
DFIR – The incident response process
2
DFIR – The incident response framework
3
DFIR – The incident response plan
4
DFIR – The incident response playbook
5
DFIR – Testing the incident response framework
Managing Cyber Incidents
1
DFIR – Engaging the incident response team
2
DFIR – Incorporating crisis communications
3
DFIR – Investigating incidents
4
DFIR – Incorporating containment strategies
5
DFIR – Getting back to normal – eradication and recovery
Fundamentals of Digital Forensics
1
DFIR – Legal aspects
2
DFIR – Digital forensics fundamentals
Collecting Network Evidence
1
DFIR – An overview of network evidence
2
DFIR – Firewalls and proxy logs
3
DFIR – NetFlow
4
DFIR – Packet captures
5
DFIR – Wireshark
6
DFIR – Evidence collection
Acquiring Host-Based Evidence
1
DFIR – Preparation
2
DFIR – Order of Volatility
3
DFIR – Evidence acquisition
4
DFIR – Acquiring volatile memory
5
DFIR – Acquiring non-volatile evidence
Forensic Imaging
1
DFIR – Understanding forensic imaging
2
DFIR – Imaging tools
3
DFIR – Preparing a stage drive
4
DFIR – Using write blockers
5
DFIR – Imaging techniques
Analyzing Network Evidence
1
DFIR – Network evidence overview
2
DFIR – Analyzing firewall and proxy logs
3
DFIR – Analyzing NetFlow
4
DFIR – Analyzing packet captures
Analyzing System Memory
1
DFIR – Memory analysis overview
2
DFIR – Memory analysis methodology
3
DFIR – Memory analysis with Redline
4
DFIR – Memory analysis with Volatility
5
DFIR – Memory analysis with strings
Analyzing System Storage
1
DFIR – Forensic platforms
2
DFIR – Autopsy
3
DFIR – MFT analysis
4
DFIR – Registry analysis
Analyzing Log Files
1
DFIR – Logging and log management
2
DFIR – Working with event management systems
3
DFIR – Understanding Windows logs
4
DFIR – Analyzing Windows event logs
Writing the Incident Report
1
DFIR – Documentation overview
2
DFIR – Incident tracking
3
DFIR – Written reports
Malware Analysis for Incident Response
1
DFIR – Malware classifications
2
DFIR – Malware analysis overview
3
DFIR – Analyzing malware
4
DFIR – Dynamic analysis
Leveraging Threat Intelligence
1
DFIR – Understanding threat intelligence
2
DFIR – Threat intelligence methodology
3
DFIR – Threat intelligence sources
4
DFIR – Threat intelligence platforms
5
DFIR – Using threat intelligence
Hunting for Threats
1
DFIR – The threat hunting maturity model
2
DFIR – Threat hunt cycle
3
DFIR – MITRE ATT&CK
4
DFIR – Threat hunt planning
5
DFIR – Threat hunt reporting
Be the first to add a review.
Please, login to leave a review