Network Forensics-Network Forensics
Network forensics with Zeek: conn.log
()
Network forensics with Zeek: http.log
()
Network forensics with Zeek: dns.log
()
Network forensics with Zeek: putting them together
()
Introduction to Wireshark
()
Network forensics with Wireshark
()
Memory Forensics-Memory Forensics
Memory forensics: extracting a memory dump
()
Memory forensics: extracting artifacts and IOCs with Volatility
()
Incident Response Scenario 1: Data Breach/Hacking Incident-Incident Response Scenario 1: Data Breach/Hacking Incident
Data breach/hacking incident: Investigation
()
Data breach/hacking incident: Containment
()
Data breach/hacking incident: Eradication/Validation
()
Incident Response Scenario 2: Live Ongoing Hacking Incident-Incident Response Scenario 2: Live Ongoing Hacking Incident
Live ongoing hacking incident: Detection/Investigation
()
Live ongoing hacking incident: Investigation/Containment
()
Incident Response Scenario 3: SolarWinds -SolarWinds
SolarWinds case
()