Companies Home Search Profile

Learning Cyber Incident Response and Digital Forensics

Focused View

Jason Dion

4:58:46

193 View
  • 01 - Overview.mp4
    06:45
  • 02 - Getting started.mp4
    01:52
  • 01 - Digital forensics.mp4
    03:46
  • 02 - What is cybercrime.mp4
    05:27
  • 03 - Digital forensics investigations.mp4
    08:08
  • 04 - Types of evidence.mp4
    07:56
  • 05 - Best practices.mp4
    07:22
  • 06 - Review of the chapter quiz.mp4
    04:37
  • 01 - Selecting forensic tools.mp4
    02:34
  • 02 - Types of forensic tools.mp4
    07:37
  • 03 - Commercial vs. open-source forensic tools.mp4
    10:10
  • 04 - Legal considerations.mp4
    07:41
  • 05 - Building a forensic toolkit.mp4
    05:45
  • 06 - Review of the chapter quiz.mp4
    07:04
  • 01 - Digital forensic investigation.mp4
    01:43
  • 02 - Preserving evidence.mp4
    05:23
  • 03 - Preparing an evidence drive.mp4
    02:42
  • 04 - Creating a trusted tools USB drive.mp4
    13:35
  • 05 - Collecting volatile evidence.mp4
    06:39
  • 06 - Collecting network evidence.mp4
    06:05
  • 07 - Imaging storage devices with FTK.mp4
    07:25
  • 08 - Imaging a USB drive with DD.mp4
    04:19
  • 09 - Review of the chapter quiz.mp4
    05:20
  • 01 - Conducting forensic analysis.mp4
    03:39
  • 02 - Analyzing memory contents.mp4
    16:16
  • 03 - Importing evidence into Autopsy.mp4
    07:43
  • 04 - Analyzing hidden and deleted files.mp4
    08:54
  • 05 - Analyzing the windows registry.mp4
    09:50
  • 06 - Conducting log analysis.mp4
    05:17
  • 07 - Creating your report.mp4
    06:30
  • 08 - Other considerations.mp4
    03:45
  • 09 - Review of the chapter quiz.mp4
    07:14
  • 01 - Cyber incident response.mp4
    03:43
  • 02 - Preparation phase.mp4
    03:32
  • 03 - Detection and analysis phase.mp4
    08:32
  • 04 - Containment, eradication, and recovery phase.mp4
    06:24
  • 05 - Post-incident activity phase.mp4
    05:54
  • 06 - Review of the chapter quiz.mp4
    05:21
  • 01 - Conducting a cyber incident response.mp4
    06:48
  • 02 - Static analysis with floss.mp4
    02:35
  • 03 - Dynamic analysis with Autoruns.mp4
    03:36
  • 04 - Investigating the scheduled task.mp4
    03:02
  • 05 - Packet analysis with Wireshark and process monitoring.mp4
    08:57
  • 06 - Files and folders created.mp4
    03:40
  • 07 - Static analysis with IDA and OllyDbg.mp4
    04:24
  • 08 - Static analysis with process dump.mp4
    08:09
  • 09 - Malware IoC research.mp4
    04:32
  • 10 - Review of the chapter quiz.mp4
    05:37
  • 01 - What to do next.mp4
    04:57
  • Description


    If your organization is the victim of a cyberattack, are you ready to respond? In this course, cybersecurity trainer Jason Dion guides you through the basics of how to conduct an incident response, including how evidence is collected for further digital forensic investigation. Jason explains some fundamentals of digital forensics, like the definition of cybercrime, types of evidence, and best practices. He goes over selecting forensic tools and steps you through conducting a digital forensic investigation. Forensic analysis is also included in a digital forensic investigation, and Jason highlights all the steps you need to take. He also covers crafting and then conducting a cyber incident response. This course serves as an introduction to the field of digital forensics and incident response practices, by providing hands-on demonstrations of various tools and techniques used by real world professionals in the field.

    This course was created by Jason Dion. We are pleased to host this training in our library.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Jason Dion specializes in actionable information you can use to further your Cyber Security and Information Technology career. He provides IT certification and training videos to help students prepare for a career in the Information Technology and Cyber Security field, providing you with the real world training and application to today's cyber security challenges. Jason Dion, CISSP No. 349867, is an Instructor at Liberty University’s College of Engineering and Computational Science and Anne Arundel Community College’s Department of Computing Technologies with multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), Security+, Network+, A+, PRINCE2, PRINCE2 Agile, and ITIL.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 49
    • duration 4:58:46
    • English subtitles has
    • Release Date 2023/04/11