Browsing the "Digital Forensics" Tag

Dual Boot Kali Linux 2020.1b Install in Windows 10 (1909 lastest) | Simple Steps | OS Installation

May 2nd, 2020 📆 | 4750 Views ⚑

Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing.It is maintained and funded by Offensive

Tagged with:

Securing Your Future in DFIR

May 1st, 2020 📆 | 1789 Views ⚑

One of the most popular questions posed in the field of DFIR is, “how do I get into the field?”

Tagged with:

15 BEST Digital Forensic Tools in 2020 | #Investigation #Critical Information

February 29th, 2020 📆 | 6903 Views ⚑

15 BEST #Digital #Forensic #Tools Digital forensic is a process of preservation, identification, extraction, and documentation of computer evidence which

Tagged with:

Jupyter Notebooks and Pre-recorded Datasets for Threat Hunting – SANS THIR Summit 2019

February 27th, 2020 📆 | 4230 Views ⚑

How many times have you thought about a more efficient, intuitive, or creative way to analyze the security events your

Tagged with:

My “Aha!” Moment – Methods, Tips, & Lessons Learned in Threat Hunting – SANS THIR Summit 2019

February 26th, 2020 📆 | 1530 Views ⚑

This presentation is designed as a personal journey through threat hunting to inspire others to embrace certain methods, tips, and

Tagged with:

From Tool Building to Scalable Automation – SANS DFIR Summit 2019 Keynote

February 10th, 2020 📆 | 7968 Views ⚑

There are many reasons to write forensics tools, from making it open source, to being free from a vendor for

Tagged with:

Digital forensics and incident response: Is it the career for you?

December 11th, 2019 📆 | 8450 Views ⚑

From fraud to extortion to intellectual property theft, new cybercrimes are being committed daily. Digital forensics and incident response (DFIR)

Tagged with:

DFI Forensics – Digital Forensics: What we do and why choose us!

November 26th, 2019 📆 | 3955 Views ⚑

Digital forensics is the field of forensic science that seeks to determine the facts surrounding an occurrence or event through

Tagged with:

Cyber Threat Intelligence Summit 2020

November 7th, 2019 📆 | 2085 Views ⚑

2020 CTI Summit: Summit: January 20-21 | Courses: January 22-27 The Cyber Threat Intelligence Summit & Training brings together

Tagged with:

Distributed Evidence Collection and Analysis with Velociraptor – SANS DFIR Summit 2019

October 7th, 2019 📆 | 3554 Views ⚑

Distributed Evidence Collection and Analysis with Velociraptor: Fast, Surgical, at Scale…and Free! Having the ability to rapidly collect and examine

Tagged with:

Digital Forensics | Recon-NG Reporting

September 3rd, 2019 📆 | 2564 Views ⚑

Offensive Security Online Courses: Complete Metasploit Course on Vimeo: Hello Everyone and welcome to another video by Black

Tagged with:

Introduction to Arsenal Image Mounter

August 27th, 2019 📆 | 4460 Views ⚑

As a continuation of the 13Cubed “Introduction to Windows Forensics” series, this episode covers a powerful image mounting tool called

Tagged with:

Digital Forensics | Recon-NG Marketplace

August 27th, 2019 📆 | 5155 Views ⚑

Offensive Security Online Courses: Complete Metasploit Course on Vimeo: Hello Everyone and welcome to another video by Black

Tagged with:

Digital Forensics | Recon-NG Introduction

August 20th, 2019 📆 | 5455 Views ⚑

Offensive Security Online Courses: Complete Metasploit Course on Vimeo: Hello Everyone and welcome to another video by Black

Tagged with:

Weaponizing Active Directory

August 1st, 2019 📆 | 5463 Views ⚑

Download slides: 0:54 Background behind this webcast, what and why 7:02 Creating resources in Active Directory, User accounts, Groups,

Tagged with:

All you need to know about FOR508: Advanced Incident Response, Threat Hunting & Digital Forensics

July 25th, 2019 📆 | 6364 Views ⚑

We sat down with Alissa Torres, SANS Principal Instructor, to talk about one of the courses she teaches. The SANS

Tagged with:

Schroedinger’s Backslash: Tracking the Chinese APT Goblin Panda with RTF Metadata – SANS CTI Summit

July 23rd, 2019 📆 | 3969 Views ⚑

The APT Group Goblin Panda (aka, Conimes and China 1937CN Team) is an active threat to government and diplomatic organizations

Tagged with:

How to Get Promoted: Developing Metrics to Show How Threat Intel Works – SANS CTI Summit 2019

July 16th, 2019 📆 | 2790 Views ⚑

Many organizations have operationalized threat intelligence as part of a well-rounded security program, but we often struggle to show the

Tagged with:

My Cyber Security Degree in 10 Minutes ( from a junior in college )

July 15th, 2019 📆 | 3664 Views ⚑

READ ME!!! 1st – I got this idea from Jarvis Johnson, check out his video “My Whole Computer Science Degree

Tagged with:

Threat Hunting & Incident Response Summit & Training 2019 – Sneak Peek

June 7th, 2019 📆 | 3488 Views ⚑

Will you be the hunter or the prey? — Learn how to become an elite threat hunter. The two-day Summit

Tagged with:

Privacy vs. Security: It’s a Log Story – SANS CTI 2019 Keynote

May 30th, 2019 📆 | 7238 Views ⚑

Privacy and security are often lumped together as one subject with similar objectives. But as many security professionals know, these

Tagged with:

Analytic Tradecraft in the Real World – SANS CTI Summit 2019

May 23rd, 2019 📆 | 3351 Views ⚑

Cyber threat intelligence is built on a traditional intelligence framework. Often, information security focuses on scientific concepts that entail a

Tagged with: