Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

SANS DFIR WEBCAST - Network Forensics What Are Your Investigations Missing

Автор: SANS Digital Forensics and Incident Response

Загружено: 2015-02-06

Просмотров: 14080

Описание:

Traditionally, computer forensic investigations focused exclusively on data from the seized media associated with a system of interest.
Recently, memory analysis has become an integral part of forensic analysis, resulting in a new and significantly different way for digital examiners and investigators to perform their craft.

Now another evolution in computer forensics is at hand - one that includes data collected from network devices as well as the from wires themselves. Every day, more and more network-enabled products hit the market. Incorporating network data from those devices during the analytic process is critical for providing a complete understanding of the event under investigation. Even in traditional data-at-rest examinations, the network may hold the only clues left behind by a diligent attacker that has covered his or her tracks.

We'll discuss how network-based evidence can support traditional data-at-rest computer forensic analysis. Other topics will include the sources and methodologies for collecting network evidence. By knowing what existing data to ask for and what additional data to collect during an investigation, we can provide a more comprehensive analysis of the event at hand.

by Phil Hagen

Philip Hagen has been working in the information security field since 1998, running the full spectrum including deep technical tasks, management of an entire computer forensic services portfolio, and executive responsibilities.

Currently, Phil is an Evangelist at Red Canary, where engages with current and future customers of Red Canary's managed threat detection service to ensure their use of the service is best aligned for success in the face of existing and future threats.

Phil started his security career while attending the US Air Force Academy, with research covering both the academic and practical sides of security. He served in the Air Force as a communications officer at Beale AFB and the Pentagon. In 2003, Phil shifted to a government contractor, providing technical services for various IT and information security projects. These included systems that demanded 24x7x365 functionality. He later managed a team of 85 computer forensic professionals in the national security sector. He has provided forensic consulting services for law enforcement, government, and commercial clients prior to joining the Red Canary team. Phil is also a certified instructor for the SANS Institute, and is the course lead and co-author of FOR572, Advanced Network Forensics and Analysis.

SANS DFIR WEBCAST - Network Forensics What Are Your Investigations Missing

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Next Level in Cyber Threat Intelligence Training: New FOR578 course updates

Next Level in Cyber Threat Intelligence Training: New FOR578 course updates

DFIR 101: Digital Forensics Essentials | Kathryn Hedley

DFIR 101: Digital Forensics Essentials | Kathryn Hedley

From Service to Strategy: The AI‑Driven Leadership Pivot

From Service to Strategy: The AI‑Driven Leadership Pivot

Криминалистическое получение данных в Windows — FTK Imager

Криминалистическое получение данных в Windows — FTK Imager

DNS Evidence  You Don’t Know What You’re Missing

DNS Evidence You Don’t Know What You’re Missing

SANS DFIR Webcast - Memory Forensics for Incident Response

SANS DFIR Webcast - Memory Forensics for Incident Response

Сети для несетевиков // OSI/ISO, IP и MAC, NAT, TCP и UDP, DNS

Сети для несетевиков // OSI/ISO, IP и MAC, NAT, TCP и UDP, DNS

Если у тебя спросили «Как твои дела?» — НЕ ГОВОРИ! Ты теряешь свою силу | Еврейская мудрость

Если у тебя спросили «Как твои дела?» — НЕ ГОВОРИ! Ты теряешь свою силу | Еврейская мудрость

Введение в локальные сети — основы сетевых технологий

Введение в локальные сети — основы сетевых технологий

Анализ данных YouTube | Комплексный проект по обработке данных

Анализ данных YouTube | Комплексный проект по обработке данных

Forensic Investigations – Tools and Hacks Observed - Ondrej Krehel

Forensic Investigations – Tools and Hacks Observed - Ondrej Krehel

SIFT Workstation and REMnux Wonder Twin Powers Activate!

SIFT Workstation and REMnux Wonder Twin Powers Activate!

КАК УСТРОЕН TCP/IP?

КАК УСТРОЕН TCP/IP?

Introduction to Windows Forensics

Introduction to Windows Forensics

Набор инструментов KoBo для начинающих

Набор инструментов KoBo для начинающих

Теорема Байеса, геометрия изменения убеждений

Теорема Байеса, геометрия изменения убеждений

Введение в кибербезопасность | Обучение кибербезопасности для начинающих | CyberSecurity | Simpli...

Введение в кибербезопасность | Обучение кибербезопасности для начинающих | CyberSecurity | Simpli...

Проектирование системы WHATSAPP: системы чат-сообщений для собеседований

Проектирование системы WHATSAPP: системы чат-сообщений для собеседований

SOF ELK®  A Free, Scalable Analysis Platform for Forensic, Incident Response, and Security Operation

SOF ELK® A Free, Scalable Analysis Platform for Forensic, Incident Response, and Security Operation

Маска подсети — пояснения

Маска подсети — пояснения

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]