Browsing the "learn digital forensics" Tag

Securing Your Future in DFIR

May 1st, 2020 📆 | 7388 Views ⚑

One of the most popular questions posed in the field of DFIR is, “how do I get into the field?”

Tagged with:




Jupyter Notebooks and Pre-recorded Datasets for Threat Hunting – SANS THIR Summit 2019

February 27th, 2020 📆 | 2675 Views ⚑

How many times have you thought about a more efficient, intuitive, or creative way to analyze the security events your

Tagged with:




My “Aha!” Moment – Methods, Tips, & Lessons Learned in Threat Hunting – SANS THIR Summit 2019

February 26th, 2020 📆 | 4153 Views ⚑

This presentation is designed as a personal journey through threat hunting to inspire others to embrace certain methods, tips, and

Tagged with:




From Tool Building to Scalable Automation – SANS DFIR Summit 2019 Keynote

February 10th, 2020 📆 | 2762 Views ⚑

There are many reasons to write forensics tools, from making it open source, to being free from a vendor for

Tagged with:




Cyber Threat Intelligence Summit 2020

November 7th, 2019 📆 | 4539 Views ⚑

2020 CTI Summit: http://www.sans.org/u/XjA Summit: January 20-21 | Courses: January 22-27 The Cyber Threat Intelligence Summit & Training brings together

Tagged with:




Distributed Evidence Collection and Analysis with Velociraptor – SANS DFIR Summit 2019

October 7th, 2019 📆 | 7203 Views ⚑

Distributed Evidence Collection and Analysis with Velociraptor: Fast, Surgical, at Scale…and Free! Having the ability to rapidly collect and examine

Tagged with:




Introduction to Arsenal Image Mounter

August 27th, 2019 📆 | 3803 Views ⚑

As a continuation of the 13Cubed “Introduction to Windows Forensics” series, this episode covers a powerful image mounting tool called

Tagged with:




Schroedinger’s Backslash: Tracking the Chinese APT Goblin Panda with RTF Metadata – SANS CTI Summit

July 23rd, 2019 📆 | 6650 Views ⚑

The APT Group Goblin Panda (aka, Conimes and China 1937CN Team) is an active threat to government and diplomatic organizations

Tagged with:




How to Get Promoted: Developing Metrics to Show How Threat Intel Works – SANS CTI Summit 2019

July 16th, 2019 📆 | 4804 Views ⚑

Many organizations have operationalized threat intelligence as part of a well-rounded security program, but we often struggle to show the

Tagged with:




Threat Hunting & Incident Response Summit & Training 2019 – Sneak Peek

June 7th, 2019 📆 | 6627 Views ⚑

Will you be the hunter or the prey? — Learn how to become an elite threat hunter. The two-day Summit

Tagged with:




Privacy vs. Security: It’s a Log Story – SANS CTI 2019 Keynote

May 30th, 2019 📆 | 4682 Views ⚑

Privacy and security are often lumped together as one subject with similar objectives. But as many security professionals know, these

Tagged with:




Analytic Tradecraft in the Real World – SANS CTI Summit 2019

May 23rd, 2019 📆 | 1869 Views ⚑

Cyber threat intelligence is built on a traditional intelligence framework. Often, information security focuses on scientific concepts that entail a

Tagged with:




Language and Culture in Threat Intelligence – SANS CTI Summit 2019

May 9th, 2019 📆 | 4375 Views ⚑

Language serves as the required medium for every form of communication, whether it be via email, a phone call, or

Tagged with:




Meet Me in the Middle: Threat Indications and Warning in Principle & Practice – SANS CTI Summit 2019

May 2nd, 2019 📆 | 8503 Views ⚑

Discussions on threat intelligence often get bogged down between “machine speed” ingestion of atomic indicators and in-depth analysis of activity

Tagged with:




Unsolved Mysteries – Revisiting the APT Cold Case Files – SANS CTI Summit 2019

April 25th, 2019 📆 | 8285 Views ⚑

No matter how fascinating the advanced persistent threats (APTs) we discover, we often find that there’s never enough time for

Tagged with:




Lean Hunting – SANS Threat Hunting Summit 2018

February 27th, 2019 📆 | 5568 Views ⚑

(Threat) Hunting has been around long enough that most agree it should be part of any comprehensive information security program.

Tagged with:




Leveraging Data Science to Discover Persistent Threats – SANS Threat Hunting Summit 2018

February 6th, 2019 📆 | 4623 Views ⚑

Viewing the Nodes in the Noise: Leveraging Data Science to Discover Persistent Threats CenturyLink has been working on three algorithms

Tagged with:




Quantify Your Hunt: Not Your Parents’ Red Team – SANS Threat Hunting Summit 2018

January 16th, 2019 📆 | 7086 Views ⚑

The security marketplace is saturated with product claims of detection coverage that have been almost impossible to evaluate, all while

Tagged with: