Forensics

Results: 1448



#Item
731

Modern Incident Response Jeffrey J. Guy | 9 Jun 14 [removed] @jjguy ©2014 Bit9. All Rights Reserved

Add to Reading List

Source URL: digital-forensics.sans.org

- Date: 2014-06-11 17:23:10
    732Computer forensics / Digital forensics / Malware / Forensic disk controller / Anti-computer forensics / Rootkit / Network forensics / Mobile device forensics / EnCase / Computer security / System software / Computing

    C O U R S E C A T A L O G SANS Forensics Curriculum SANS Digital Forensics and Incident Response line-up features courses both

    Add to Reading List

    Source URL: digital-forensics.sans.org

    Language: English - Date: 2014-03-14 15:52:44
    733Security / Crime / Conspiracy theories / Nuclear program of Iran / Rootkits / Stuxnet / Industrial espionage / Computer security / International Cybercrime / Cyberwarfare / Cybercrime / Computer crimes

    Cyber Crime and Cyber Forensics for Criminal Law Practitioners Steven Chabinsky General Counsel and Chief Risk Officer, CrowdStrike Presented 20 May 2014, Continuing Legal Education & Training,

    Add to Reading List

    Source URL: www.armfor.uscourts.gov

    Language: English - Date: 2014-06-17 14:39:05
    734VMware / Firewall / System software / Software / Computer network security / Computing / VMDK

    To Silo, or Not to Silo: That is the Question Frank McClain, GCFA, GCIH, CHFI InfoSec Manager, CSIRT Lead PrimeLending, A PlainsCapital Company

    Add to Reading List

    Source URL: digital-forensics.sans.org

    Language: English - Date: 2014-06-11 17:22:46
    735

    The Application Onion Peeling away the mystery, exposing the data Lee Reiber, VP Mobile Forensic Solutions, AccessData Today’s Trends

    Add to Reading List

    Source URL: digital-forensics.sans.org

    Language: English - Date: 2014-06-11 17:23:04
      736Internet standards / Netstat / Scripting languages / Find / Uniq / Grep / Netsh / IPv6 / File Transfer Protocol / Computing / Software / Unix

      Updates/Suggestions: http://isc.sans.org/contact.html IP Address Information ISC Summary: http://isc.sans.org/ipinfo.html?ip=[ip address] for automated systems: http://isc.sans.org/ipinfo_ascii.html?ip=[ip address]

      Add to Reading List

      Source URL: digital-forensics.sans.org

      Language: English - Date: 2014-03-21 11:17:18
      737Software / Computing / The Sleuth Kit / Volume / Inode / Loop device / NTFS / File system / System software / Disk file systems / Unix

      Microsoft Word - For508_HANDOUT_SIFT WORKSTATION CHEAT SHEET 3.0.docx

      Add to Reading List

      Source URL: digital-forensics.sans.org

      Language: English - Date: 2014-03-21 11:17:19
      738Windows NT architecture / Svchost.exe / Malware / Service Control Manager / Session Manager Subsystem / Windows Registry / Rootkit / Environment variable / Windows service / Microsoft Windows / System software / Computing

      S A N S D F I R C urriculum

      Add to Reading List

      Source URL: digital-forensics.sans.org

      Language: English - Date: 2014-03-14 15:52:44
      739Mac OS / Disk file systems / Archive formats / HFS Plus / File system / Device file / Tar / Apple Disk Image / Extent / Computing / System software / Software

      FOR518_HFS+_CheatSheet.pptx

      Add to Reading List

      Source URL: digital-forensics.sans.org

      Language: English - Date: 2015-01-28 16:38:41
      740Scripting languages / Pattern matching / Grep / AWK / Sed / Find / Uniq / Newline / Nl / Computing / Software / Unix

      Microsoft Word - NETWORK FORENSICS CHEAT SHEET 1.0-1

      Add to Reading List

      Source URL: digital-forensics.sans.org

      Language: English - Date: 2014-03-21 11:17:18
      UPDATE