محتوى الدورة
Getting Started with the SIFT Workstation Webcast with Rob Lee The Cycle of Cyber Threat Intelligence SANS DFIR Webcast - Incident Response Event Log Analysis SANS DFIR Webcast - Memory Forensics for Incident Response FOR508 - Advanced Incident Response and Threat Hunting Course Updates: Hunting Guide Real-Time Threat Hunting - SANS Threat Hunting & Incident Response Summit 2017 SOF ELK® A Free, Scalable Analysis Platform for Forensic, Incident Response, and Security Operation Detecting & Hunting Ransomware Operator Tools: It Is Easier Than You Think! Investigating WMI Attacks Triage Collection and Timeline Analysis with KAPE What Event Logs? Part 1: Attacker Tricks to Remove Event Logs Handling Ransomware Incidents: What YOU Need to Know! Incident Response Training Course - SANS Institute - DFIR - FOR508 - Rob Lee Introducing the New SANS DFIR “Hunt Evil“ Poster Incident Response in the Cloud (AWS) - SANS Digital Forensics & Incident Response Summit 2017 Ghidra Code Analysis with Anuj Soni Exploring Registry Explorer The Magic of Raw Data Carving Updated FOR578: Training for Security Personnel and Why Intelligence Matters to You The Truth about Ransomware: Its not Complicated! Windows Credentials Attacks, Mitigations & Defense Huntworld - SANS Threat Hunting & Incident Response Summit 2017 What’s New in REMnux v7 Threat Intelligence Naming Conventions: Threat Actors, & Other Ways of Tracking Threats FOR500: Windows Forensics Analysis What is new in FOR500: Windows Forensics Course? Windows 10 and beyond - Understanding the Forensic Science in Digital Forensics Open-Source DFIR Made Easy: The Setup - SANS Digital Forensics & Incident Response Summit 2017 Network Forensics Training Course - SANS Institute - DFIR - FOR572 - Phil Hagen The Secret History of Cyber War - SANS Digital Forensics and Incident Response Summit 2017 FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics Shortcuts for Understanding Malicious Scripts Enabling KAPE at Scale Getting started in DFIR: Testing 1,2,3 Advanced Zeek Usage Scripting and Framework SIFT Workstation and REMnux Wonder Twin Powers Activate! From Seizure to Actionable Intelligence in 90 Minutes or Less The SOC Puzzle: Where Does Threat Hunting Fit? | 2020 Threat Hunting & Incident Response Summit SANS Digital Forensics and Incident Response (DFIR) NetWars What's new in the FOR610: Reverse-Engineering Malware Analysis course in 2017 AmCache Investigation - SANS Digital Forensics & Incident Response Summit 2019 Why and How to Take the GCTI The Industry’s Cyber Threat Intelligence Certification FOR572 Class Demo - vLive WannaCry Ransomware Threat : What we know so far - SANS WEBCAST (Am)Cache rules everything around me Making Memories: Using Memory Analysis for Faster Response to User Investigations - SANS DFIR Summit Cloud Storage Forensics Endpoint Evidence MAC Times, Mac Times, and More - SANS Digital Forensics & Incident Response Summit 2017 What is new in SANS FOR585: Smartphone Forensic Analysis In-Depth Unsolved Mysteries – Revisiting the APT Cold Case Files - SANS CTI Summit 2019 Getting Started with the SIFT Workstation Webcast with Rob Lee The Cycle of Cyber Threat Intelligence SANS DFIR Webcast - Incident Response Event Log Analysis SANS DFIR Webcast - Memory Forensics for Incident Response FOR508 - Advanced Incident Response and Threat Hunting Course Updates: Hunting Guide Real-Time Threat Hunting - SANS Threat Hunting & Incident Response Summit 2017 SOF ELK® A Free, Scalable Analysis Platform for Forensic, Incident Response, and Security Operation Detecting & Hunting Ransomware Operator Tools: It Is Easier Than You Think! Investigating WMI Attacks Triage Collection and Timeline Analysis with KAPE What Event Logs? Part 1: Attacker Tricks to Remove Event Logs Handling Ransomware Incidents: What YOU Need to Know! Incident Response Training Course - SANS Institute - DFIR - FOR508 - Rob Lee Introducing the New SANS DFIR “Hunt Evil“ Poster Incident Response in the Cloud (AWS) - SANS Digital Forensics & Incident Response Summit 2017 Ghidra Code Analysis with Anuj Soni Exploring Registry Explorer The Magic of Raw Data Carving Updated FOR578: Training for Security Personnel and Why Intelligence Matters to You The Truth about Ransomware: Its not Complicated! Windows Credentials Attacks, Mitigations & Defense Huntworld - SANS Threat Hunting & Incident Response Summit 2017 What’s New in REMnux v7 Threat Intelligence Naming Conventions: Threat Actors, & Other Ways of Tracking Threats FOR500: Windows Forensics Analysis What is new in FOR500: Windows Forensics Course? Windows 10 and beyond - Understanding the Forensic Science in Digital Forensics Open-Source DFIR Made Easy: The Setup - SANS Digital Forensics & Incident Response Summit 2017 Network Forensics Training Course - SANS Institute - DFIR - FOR572 - Phil Hagen The Secret History of Cyber War - SANS Digital Forensics and Incident Response Summit 2017 FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics Shortcuts for Understanding Malicious Scripts Enabling KAPE at Scale Getting started in DFIR: Testing 1,2,3 Advanced Zeek Usage Scripting and Framework SIFT Workstation and REMnux Wonder Twin Powers Activate! From Seizure to Actionable Intelligence in 90 Minutes or Less The SOC Puzzle: Where Does Threat Hunting Fit? | 2020 Threat Hunting & Incident Response Summit SANS Digital Forensics and Incident Response (DFIR) NetWars What's new in the FOR610: Reverse-Engineering Malware Analysis course in 2017 AmCache Investigation - SANS Digital Forensics & Incident Response Summit 2019 Why and How to Take the GCTI The Industry’s Cyber Threat Intelligence Certification FOR572 Class Demo - vLive WannaCry Ransomware Threat : What we know so far - SANS WEBCAST (Am)Cache rules everything around me Making Memories: Using Memory Analysis for Faster Response to User Investigations - SANS DFIR Summit Cloud Storage Forensics Endpoint Evidence MAC Times, Mac Times, and More - SANS Digital Forensics & Incident Response Summit 2017 What is new in SANS FOR585: Smartphone Forensic Analysis In-Depth Unsolved Mysteries – Revisiting the APT Cold Case Files - SANS CTI Summit 2019 Getting Started with the SIFT Workstation Webcast with Rob Lee The Cycle of Cyber Threat Intelligence SANS DFIR Webcast - Incident Response Event Log Analysis SANS DFIR Webcast - Memory Forensics for Incident Response FOR508 - Advanced Incident Response and Threat Hunting Course Updates: Hunting Guide Real-Time Threat Hunting - SANS Threat Hunting & Incident Response Summit 2017 SOF ELK® A Free, Scalable Analysis Platform for Forensic, Incident Response, and Security Operation Detecting & Hunting Ransomware Operator Tools: It Is Easier Than You Think! Investigating WMI Attacks Triage Collection and Timeline Analysis with KAPE What Event Logs? Part 1: Attacker Tricks to Remove Event Logs Handling Ransomware Incidents: What YOU Need to Know! Incident Response Training Course - SANS Institute - DFIR - FOR508 - Rob Lee Introducing the New SANS DFIR “Hunt Evil“ Poster Incident Response in the Cloud (AWS) - SANS Digital Forensics & Incident Response Summit 2017 Ghidra Code Analysis with Anuj Soni

للحصول على شهادة

  • 1- التسجيل
  • 2- مشاهدة الكورس كاملا
  • 3- متابعة نسبة اكتمال الكورس تدريجيا
  • 4- بعد الانتهاء تظهر الشهادة في الملف الشخصي الخاص بك