وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Learning Cyber Incident Response and Digital Forensics

سرفصل های دوره

If your organization is the victim of a cyberattack, are you ready to respond? In this course, cybersecurity trainer Jason Dion guides you through the basics of how to conduct an incident response, including how evidence is collected for further digital forensic investigation. Jason explains some fundamentals of digital forensics, like the definition of cybercrime, types of evidence, and best practices. He goes over selecting forensic tools and steps you through conducting a digital forensic investigation. Forensic analysis is also included in a digital forensic investigation, and Jason highlights all the steps you need to take. He also covers crafting and then conducting a cyber incident response. This course serves as an introduction to the field of digital forensics and incident response practices, by providing hands-on demonstrations of various tools and techniques used by real world professionals in the field.

This course was created by Jason Dion. We are pleased to host this training in our library.


01 - Learning Cyber Incident Response and Digital Forensics
  • 01 - Overview
  • 02 - Getting started

  • 02 - 1. Fundamentals of Digital Forensics
  • 01 - Digital forensics
  • 02 - What is cybercrime
  • 03 - Digital forensics investigations
  • 04 - Types of evidence
  • 05 - Best practices
  • 06 - Review of the chapter quiz

  • 03 - 2. Selecting Forensic Tools
  • 01 - Selecting forensic tools
  • 02 - Types of forensic tools
  • 03 - Commercial vs. open-source forensic tools
  • 04 - Legal considerations
  • 05 - Building a forensic toolkit
  • 06 - Review of the chapter quiz

  • 04 - 3. Digital Forensic Investigation
  • 01 - Digital forensic investigation
  • 02 - Preserving evidence
  • 03 - Preparing an evidence drive
  • 04 - Creating a trusted tools USB drive
  • 05 - Collecting volatile evidence
  • 06 - Collecting network evidence
  • 07 - Imaging storage devices with FTK
  • 08 - Imaging a USB drive with DD
  • 09 - Review of the chapter quiz

  • 05 - 4. Conducting Forensic Analysis
  • 01 - Conducting forensic analysis
  • 02 - Analyzing memory contents
  • 03 - Importing evidence into Autopsy
  • 04 - Analyzing hidden and deleted files
  • 05 - Analyzing the windows registry
  • 06 - Conducting log analysis
  • 07 - Creating your report
  • 08 - Other considerations
  • 09 - Review of the chapter quiz

  • 06 - 5. Cyber Incident Response
  • 01 - Cyber incident response
  • 02 - Preparation phase
  • 03 - Detection and analysis phase
  • 04 - Containment, eradication, and recovery phase
  • 05 - Post-incident activity phase
  • 06 - Review of the chapter quiz

  • 07 - 6. Conducting a Cyber Incident Response
  • 01 - Conducting a cyber incident response
  • 02 - Static analysis with floss
  • 03 - Dynamic analysis with Autoruns
  • 04 - Investigating the scheduled task
  • 05 - Packet analysis with Wireshark and process monitoring
  • 06 - Files and folders created
  • 07 - Static analysis with IDA and OllyDbg
  • 08 - Static analysis with process dump
  • 09 - Malware IoC research
  • 10 - Review of the chapter quiz

  • 08 - Conclusion
  • 01 - What to do next
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 9654
    حجم: 1167 مگابایت
    مدت زمان: 299 دقیقه
    تاریخ انتشار: 26 فروردین 1402
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید