Forensics and Incident Handling are constantly evolving and crucial topics in the area of cybersecurity. In order to stay on top of the attackers, the knowledge of Individuals and Teams responsible for collecting digital evidences and handling the incidents has to be constantly enhanced and updated. This advanced training provides skills necessary to find, collect and preserve data in a correct manner, analyze it and get to know as much about the incident as possible. This is an intense hands-on course covering the general approach to forensics and incident handling, network forensics, important aspects of Windows internals, memory and storage analysis, detecting indicators of compromise and a proper way of reporting.
Materials
Author’s unique tools, virtual lab environment, hands-on exercises, presentation slides with notes.
Examples of tools, software and examples used during the course
• Belkasoft RAM Capturer
• Wireshark
• Volatility
• The Sleuth Kit® (TSK)
• Autopsy
• DumpIt
• DC3DD
• Arsenal Image Mounter
• Reclaim Me
• ReFS Images
• SysInternals Toolkit
• ShadowCopyView
• RegRipper
• Rifiuti2
• Registry Explorer/RECmd
• FullEventLogView
• EVTXtract
• Loki IOC Scanner
• Yara
• LECmd
• LinkParser
• PECmd
• SkypeLogViewer
• SQLiteBrowser
• NetWork Miner
• StuxNet Memory Dump