Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Demystifying Digital Forensics and

Автор: Forensic Fusion Official

Загружено: 2025-12-14

Просмотров: 58

Описание:

Event: Veritas Vanguard 1.0 - Cyber Forensics Module

Theme: The Digital Frontier: From SCADA IoT to State Laboratories

Today, we are stepping into the digital realm—a domain where evidence is invisible to the naked eye but leaves a permanent footprint if you know where to look. To guide us through this complex landscape, we have two exceptional experts who represent the two pillars of our industry: Corporate Security Operations and Government Forensic Laboratories.

• Introduction to the Speakers:

First, I would like to introduce Mr. Tushar Babbar, a specialist who sits at the cutting edge of Digital Forensics and SCADA IoT.
Mr. Tushar is currently working as a SOC Analyst (L1) at AlterEgo Technology, where he actively hunts for threats using advanced tools like CrowdStrike Falcon. His role involves investigating security incidents, analyzing malware, and performing real-time threat responses—giving him a frontline perspective on modern cyberattacks. His foundation is deeply rooted in government service as well. He has served as a Digital Forensics Intern at the Directorate of Forensic Science, Gandhinagar, where he conducted critical IPDR and CDR analysis to track cybercriminal activities. Furthermore, his expertise extends to niche fields like Drone Technology and IoT Forensics, where he has successfully extracted data from smart devices and drones. With certifications as an ISO 27001:2022 Lead Auditor and in Incident Response, he brings a rigorous auditing mindset to investigation.

Next, we are honored to have a seasoned expert from the government sector, Ms. Yasmin Gurung. Ms. Yasmin is currently serving as a Forensic Expert at the State Forensic Science Laboratory, Sikkim. Her experience is vast and spans multiple prestigious institutions. She has previously worked as a Forensic Analyst at the Central Forensic Science Laboratory (CFSL), Assam, and the Regional Forensic Science Laboratory, Gangtok. What makes Ms. Yasmin unique is her versatility. While she is a Certified Ethical Hacker (CEH) and holds a specialization in Cyber/Digital Forensics from MAKAUT, she also possesses operational experience in Toxicology and Biology divisions. In her current role, she handles the acquisition and analysis of evidence from mobile phones, cloud sources, and storage devices, strictly adhering to ISO/IEC 27037:2012 standards. She is proficient with industry-standard tools like EnCase, FTK, and Cellebrite, and specializes in recovering deleted and encrypted data that criminals try to hide. From network forensics with Wireshark to courtroom testimony, she has done it all. Let us give a warm virtual applause to Ms. Yasmin Gurung!

A massive thank you to Mr. Tushar Babbar for demystifying the world of SOC operations and IoT. Your insights into how real-time threat hunting works gave our interns a glimpse into the corporate defense mechanisms that keep data safe. The way you explained the analysis of 'Ram Dumps' and drone data was particularly fascinating.

And to Ms. Yasmin Gurung, thank you for taking us inside the walls of a State Forensic Laboratory. Your detailed explanation of the 'Chain of Custody' and the rigorous standards required for digital evidence admissibility was a masterclass in professional integrity. Your experience across CFSL and State labs provided the perfect roadmap for those aspiring to join the government sector.

To our participants, today you saw the full spectrum—from stopping a hack in real-time to analyzing the device in a lab after the crime.
Please make sure to complete this week's task, which will involve a mock digital evidence report based on today's lecture. Thank you for your attention. We will see you all in the next session!

Demystifying Digital Forensics and

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Framing the Truth: Forensic Photography by Ms. Yoanna Attieh #forensicphotography #forensicscience

Framing the Truth: Forensic Photography by Ms. Yoanna Attieh #forensicphotography #forensicscience

Psychological Profiling In Forensic Anthropology by Ms. Alaa El Cheikh #criminalprofiling #nfsu

Psychological Profiling In Forensic Anthropology by Ms. Alaa El Cheikh #criminalprofiling #nfsu

Paper, Prints and Pursuit of Truth: Fingerprints and Questioned Documents (Veritas Vanguard 1.0)

Paper, Prints and Pursuit of Truth: Fingerprints and Questioned Documents (Veritas Vanguard 1.0)

Leveraging User Behavior for Cyber Threat Hunting

Leveraging User Behavior for Cyber Threat Hunting

Forensic Framework: Fundamentals of Forensic Science by Lekshmi Das (Veritas Vanguard - Session 1)

Forensic Framework: Fundamentals of Forensic Science by Lekshmi Das (Veritas Vanguard - Session 1)

SANS Webcast: Effective (Threat) Hunting Techniques

SANS Webcast: Effective (Threat) Hunting Techniques

Сисадмины больше не нужны? Gemini настраивает Linux сервер и устанавливает cтек N8N. ЭТО ЗАКОННО?

Сисадмины больше не нужны? Gemini настраивает Linux сервер и устанавливает cтек N8N. ЭТО ЗАКОННО?

Fingerprint Science | Types, Classification, Henry Classification | Forensic Science Lecture | NFSU

Fingerprint Science | Types, Classification, Henry Classification | Forensic Science Lecture | NFSU

Veritas Vanguard 1.0 - Orientation Session by Forensic Fusion

Veritas Vanguard 1.0 - Orientation Session by Forensic Fusion

My “Aha!” Moment - Methods, Tips, & Lessons Learned in Threat Hunting - SANS THIR Summit 2019

My “Aha!” Moment - Methods, Tips, & Lessons Learned in Threat Hunting - SANS THIR Summit 2019

Разведчик о том, как использовать людей

Разведчик о том, как использовать людей

Объяснение метода Threat Hunting: посмотрите на него в действии и узнайте, как он работает

Объяснение метода Threat Hunting: посмотрите на него в действии и узнайте, как он работает

МОШЕННИКИ ИЗ СБЕРБАНКА ПОПАЛИ НА ЮРИСТА! Полный разговор!

МОШЕННИКИ ИЗ СБЕРБАНКА ПОПАЛИ НА ЮРИСТА! Полный разговор!

Computer Science 101 - The First Video YOU Should Watch

Computer Science 101 - The First Video YOU Should Watch

Поиск угроз через Sysmon — саммит SANS Blue Team

Поиск угроз через Sysmon — саммит SANS Blue Team

Relaxing Deep House 2025 🌺 Chill Tropical Summer Vocal Mix 4K UHD

Relaxing Deep House 2025 🌺 Chill Tropical Summer Vocal Mix 4K UHD

Музыка для работы за компьютером | Фоновая музыка для концентрации и продуктивности

Музыка для работы за компьютером | Фоновая музыка для концентрации и продуктивности

Про СУБД, ошибки  проектирования
и использования решений 1С с Антоном Дорошкевичем

Про СУБД, ошибки проектирования и использования решений 1С с Антоном Дорошкевичем

Интернет в небе: Сергей

Интернет в небе: Сергей "Флеш" о том, как «Шахеды» и «Герберы» научились работать в одной связке

Музыка для работы - Deep Focus Mix для программирования, кодирования

Музыка для работы - Deep Focus Mix для программирования, кодирования

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]