Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Learning Cyber Incident Response and Digital Forensics

Description

Be prepared for a cyberattack by learning real-world professional techniques and creating a basic digital forensic tool kit.

Tags

Syllabus

Introduction
  • The importance of cybersecurity incident response
  • What you should know before taking this course
1. Digital Forensics
  • What is cyber crime?
  • Digital forensic investigations
  • Types of evidence
  • Best practices for digital forensic investigations
2. Incident Response
  • Cyber incident response
  • Preparation phase
  • Detection and analysis phase
  • Containment, eradication, and recovery phase
  • Post-incident activity phase
3. Selecting Forensic Tools
  • Types of forensic tools
  • Commercial vs. open-source forensic tools
  • Legal considerations when choosing forensic tools
  • A basic forensic toolkit
4. What Do You Do When an Incident Occurs?
  • Our cyber incident response scenario
  • How to preserve evidence during a cyber incident response
  • Collecting volatile forensic evidence from memory
  • Collecting network forensics evidence
  • Imaging a mass storage device
5. Analyzing the Data
  • Types of data analysis
  • Analyzing the contents of volatile memory
  • Importing evidence into Autopsy
  • Analyzing hidden and deleted files
  • Analyzing data from Windows Registry
  • Conducting log analysis
  • Creating your report
  • Other considerations for your investigations
Conclusion
  • What to do next

Online Course


Learning Cyber Incident Response and Digital Forensics

Affiliate notice

Be prepared for a cyberattack by learning real-world professional techniques and creating a basic digital forensic tool kit.

Introduction
  • The importance of cybersecurity incident response
  • What you should know before taking this course
1. Digital Forensics
  • What is cyber crime?
  • Digital forensic investigations
  • Types of evidence
  • Best practices for digital forensic investigations
2. Incident Response
  • Cyber incident response
  • Preparation phase
  • Detection and analysis phase
  • Containment, eradication, and recovery phase
  • Post-incident activity phase
3. Selecting Forensic Tools
  • Types of forensic tools
  • Commercial vs. open-source forensic tools
  • Legal considerations when choosing forensic tools
  • A basic forensic toolkit
4. What Do You Do When an Incident Occurs?
  • Our cyber incident response scenario
  • How to preserve evidence during a cyber incident response
  • Collecting volatile forensic evidence from memory
  • Collecting network forensics evidence
  • Imaging a mass storage device
5. Analyzing the Data
  • Types of data analysis
  • Analyzing the contents of volatile memory
  • Importing evidence into Autopsy
  • Analyzing hidden and deleted files
  • Analyzing data from Windows Registry
  • Conducting log analysis
  • Creating your report
  • Other considerations for your investigations
Conclusion
  • What to do next