Digital Forensics and Incident Response

Understanding Incident Response

1
DFIR – The incident response process
2
DFIR – The incident response framework
3
DFIR – The incident response plan
4
DFIR – The incident response playbook
5
DFIR – Testing the incident response framework

Managing Cyber Incidents

1
DFIR – Engaging the incident response team
2
DFIR – Incorporating crisis communications
3
DFIR – Investigating incidents
4
DFIR – Incorporating containment strategies
5
DFIR – Getting back to normal – eradication and recovery

Fundamentals of Digital Forensics

1
DFIR – Legal aspects
2
DFIR – Digital forensics fundamentals

Collecting Network Evidence

1
DFIR – An overview of network evidence
2
DFIR – Firewalls and proxy logs
3
DFIR – NetFlow
4
DFIR – Packet captures
5
DFIR – Wireshark
6
DFIR – Evidence collection

Acquiring Host-Based Evidence

1
DFIR – Preparation
2
DFIR – Order of Volatility
3
DFIR – Evidence acquisition
4
DFIR – Acquiring volatile memory
5
DFIR – Acquiring non-volatile evidence

Forensic Imaging

1
DFIR – Understanding forensic imaging
2
DFIR – Imaging tools
3
DFIR – Preparing a stage drive
4
DFIR – Using write blockers
5
DFIR – Imaging techniques

Analyzing Network Evidence

1
DFIR – Network evidence overview
2
DFIR – Analyzing firewall and proxy logs
3
DFIR – Analyzing NetFlow
4
DFIR – Analyzing packet captures

Analyzing System Memory

1
DFIR – Memory analysis overview
2
DFIR – Memory analysis methodology
3
DFIR – Memory analysis with Redline
4
DFIR – Memory analysis with Volatility
5
DFIR – Memory analysis with strings

Analyzing System Storage

1
DFIR – Forensic platforms
2
DFIR – Autopsy
3
DFIR – MFT analysis
4
DFIR – Registry analysis

Analyzing Log Files

1
DFIR – Logging and log management
2
DFIR – Working with event management systems
3
DFIR – Understanding Windows logs
4
DFIR – Analyzing Windows event logs

Writing the Incident Report

1
DFIR – Documentation overview
2
DFIR – Incident tracking
3
DFIR – Written reports

Malware Analysis for Incident Response

1
DFIR – Malware classifications
2
DFIR – Malware analysis overview
3
DFIR – Analyzing malware
4
DFIR – Dynamic analysis

Leveraging Threat Intelligence

1
DFIR – Understanding threat intelligence
2
DFIR – Threat intelligence methodology
3
DFIR – Threat intelligence sources
4
DFIR – Threat intelligence platforms
5
DFIR – Using threat intelligence

Hunting for Threats

1
DFIR – The threat hunting maturity model
2
DFIR – Threat hunt cycle
3
DFIR – MITRE ATT&CK
4
DFIR – Threat hunt planning
5
DFIR – Threat hunt reporting

Be the first to add a review.

Please, login to leave a review
Add to Wishlist
Enrolled: 0 students
Lectures: 62

Archive

Working hours

Monday 9:30 am - 6.00 pm
Tuesday 9:30 am - 6.00 pm
Wednesday 9:30 am - 6.00 pm
Thursday 9:30 am - 6.00 pm
Friday 9:30 am - 5.00 pm
Saturday Closed
Sunday Closed
Digital Forensics and Incident Response
Price:
Free