This collection of excerpts focuses on digital forensics and incident response. It examines methodologies for investigating cyber attacks, including acquiring and analyzing various types of evidence. The text explores network-based evidence like logs and packet captures, as well as host-based evidence from memory and storage. Various forensic tools and platforms are discussed, alongside the importance of documentation, reporting, and leveraging threat intelligence. The sources also address specific threats such as ransomware and the practice of threat hunting.
You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary
Get the Book now from Amazon:
https://www.amazon.com/Digital-Forensics-Incident-Response-techniques/dp/1803238674?&linkCode=ll1&tag=cvthunderx-20&linkId=7480f2078832c5caa381fddf9ffa7cb4&language=en_US&ref_=as_li_ss_tl
Published on 4 weeks, 1 day ago
If you like Podbriefly.com, please consider donating to support the ongoing development.
Donate