Surviving Digital Forensics RAM Extraction Fundamentals (1)

Surviving Digital Forensics RAM Extraction Fundamentals (1)
English | Size: 205.03 MB
Category: CBTs

Conducting a RAM extraction as part of the computer evidence collection process is a front line examiner skill which becoming more and more in demand. A system’s live memory contains an assortment of valuable forensic data. A computer analyst trained in memory forensics can dig out evidence of hidden malware processes, user activity and encryption keys or password hashes that may be critical to accesses protected data.
[Read more…]

SANS 526: Memory Forensics In-Depth (2015) PDFs & Exercises

SANS 526: Memory Forensics In-Depth (2015) PDFs & Exercises
English | Size: 1.89 GB
Category: CBTs

FOR526: Memory Forensics In-Depth provides the critical skills necessary for digital forensics examiners and incident responders to successfully perform live system memory triage and analyze captured memory images. The course uses the most effective freeware and open-source tools in the industry today and provides an in-depth understanding of how these tools work. [Read more…]

SANS 508 Advanced Digital Forensics, Incident Response and Threat Hunting (2015)

SANS 508: Advanced Digital Forensics, Incident Response and Threat Hunting (2015)
English | Size: 70.99 MB
Category: CBTs

Detect how and when a breach occurred
Identify compromised and affected systems
Determine what attackers took or changed
Contain and remediate incidents
Develop key sources of threat intelligence
Hunt down additional breaches using knowledge of the adversary [Read more…]

SANS 585 Advanced Smartphone Forensics (2017) MP3

SANS 585: Advanced Smartphone Forensics (2017) MP3
English | Size: 1.96 GB
Category: CBTs

Mobile devices are often a key factor in criminal cases, intrusions, IP theft, security threats, accident reconstruction, and more. Understanding how to leverage the data from the device in a correct manner can make or break your case and your future as an expert.
[Read more…]

SANS FOR585 Advanced Smartphone Forensics (PDF 2016)

SANS FOR585 Advanced Smartphone Forensics (PDF 2016)
English | Size: 372.71 MB
Category: E-learning | HACKING | Networking | Security

FOR585 Advanced Smartphone Forensics will help you understand:

Where key evidence is located on a smartphone
How the data got onto the smartphone
How to recover deleted mobile device data that forensic tools miss
How to decode evidence stored in third-party applications
How to detect, decompile, and analyze mobile malware and spyware
How to handle locked or encrypted devices, applications, and containers
[Read more…]

SANS FOR585 Advanced Smartphone Forensics (2017)

SANS FOR585: Advanced Smartphone Forensics (2017)
English | Size: 372.71 MB
Category: CBTs

Mobile devices are often a key factor in criminal cases, intrusions, IP theft, security threats, accident reconstruction, and more. Understanding how to leverage the data from the device in a correct manner can make or break your case and your future as an expert. FOR585: Advanced Smartphone Forensics will teach you those skills. Every time the smartphone "thinks" or makes a suggestion, the data are saved. It’s easy to get mixed up in what the forensic tools are reporting. Smartphone forensics is more than pressing the "find evidence" button and getting answers. [Read more…]

SANS FOR572 Advanced Network Forensics and Analysis (2014)

SANS FOR572: Advanced Network Forensics and Analysis (2014)
English | Size: 1.25 GB
Category: CBTs

FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS was built from the ground up to cover the most critical skills needed to mount efficient and effective post-incident response investigations. We focus on the knowledge necessary to expand the forensic mindset from residual data on the storage media from a system or device to the transient communications that occurred in the past or continue to occur. Even if the most skilled remote attacker compromised a system with an undetectable exploit, the system still has to communicate over the network. [Read more…]

572 – Advanced Network Forensics and Analysis

572 – Advanced Network Forensics and Analysis
English | Size: 12.79 GB
Category: CBTs

\572 – Advanced Network Forensics and Analysis\
capstone_data\
exercise_data\
sample_pcaps\
utilities\
vmware_images\
readme.txt
VERSION-FOR572-16-2.txt

\572 – Advanced Network Forensics and Analysis\capstone_data\
for572_capstone_netflow_2016-04.zip
for572_capstone_netflow_for_sof-elk-2016-08-17.zip
for572_capstone_traffic_2016-04.zip
[Read more…]

Learning Computer Forensics | Lynda.com

Learning Computer Forensics | Lynda.com
English | Size: 8.16 GB
Category: Computer forensics

Computer forensics is used to find legal evidence in computers or storage devices. Although this course won’t teach you how to become a digital forensics detective, it will cover the basics of this growing (and exciting) technical field. Author Jungwoo Ryoo reviews the basics: the goals of computer forensics, the types of investigations it’s used for, a forensic investigator’s typical toolset, and the legal implications of this type of work. Then he’ll show how to prepare for an investigation; acquire data "live" while the system is running, statically from a hard drive, or from a remote machine; make sure data is kept in its original state with software and hardware write blockers; analyze the data; and create a report of your findings. Jungwoo uses a combination of open-source and commercial software, so you’ll be able to uncover the information you need with the tools that are in your budget. [Read more…]

Windows Security & Forensics

Windows Security & Forensics
English | Size: 7.29 GB
Category: Tutorial

Every organization must prepare for the possibility of cybercrime within its networks or on its computer systems. Are you able to investigate crimes, like fraud, insider threats, industrial espionage, employee misuse, and computer intrusion? These days, every IT Pro should learn to recover key intelligence from Windows systems.
[Read more…]