Incident Response: Forensics, Diamond Model, IOC, IOA
Автор: SecGuy
Загружено: 2026-02-16
Просмотров: 39
Описание:
You don't build an Incident Response plan during a breach. In this video, Sec Guy dissects the massive Salt Typhoon attack to show you how professional responders hunt advanced threats. We break down the Diamond Model of Intrusion Analysis, explain why Indicators of Attack (IOA) are more valuable than Indicators of Compromise (IOC), and walk through the Order of Volatility for capturing forensic evidence before it disappears.
[Exam Ready Route - FREE]
Pass your certification for $0.
✅ Training Videos & Practice Tests
✅ Sec Guy Mobile Lab (On-the-go training powered by AI voice)
✅ Discord Access (Study sessions & Industry networking)
👉 Start Here: https://secguy.org
[Job Ready Route - MEMBERSHIP]
Stop studying and start working. Get the hands-on experience hiring managers are asking for.
🔥 Hands-On Labs: Python, Encryption, Hashing, AI, & CTFs
🔥 Salary Negotiator Workshop
🔥 Experience Builder: Real-world projects to fill your resume
👉 Get Hired: https://secguy.org
[Exam Domain Checklist]
This video covers critical objectives for the following exams:
Security+
[ ] Domain 4.1: Incident Response Procedures (Preparation, Detection, Analysis, Containment, Eradication, Recovery)
[ ] Domain 4.3: Digital Forensics (Order of Volatility, Chain of Custody, Legal Hold)
[ ] Domain 2.3: Indicators of Malicious Activity (IOC vs. IOA)
CISSP
[ ] Domain 7: Security Operations (Incident Management & Investigations)
[ ] Domain 1: Security and Risk Management (Legal & Regulatory Issues in Forensics)
CISM
[ ] Domain 4: Information Security Incident Management (IR Plans & Playbooks)
CRISC
[ ] Domain 4: Risk and Control Monitoring (Monitoring for IOCs)
CCSP
[ ] Domain 5: Cloud Security Operations (Forensics in the Cloud & Data Sovereignty)
SecurityX (CompTIA)
[ ] Domain 3.0: Security Operations (Threat Hunting & Diamond Model)
GIAC GSEC (SANS)
[ ] Incident Handling & Response: The IR Lifecycle & Forensics
AWS CSS (Certified Security – Specialty)
[ ] Domain 4: Incident Response (Automating Forensic Capture in Cloud)
Pentest+ (CompTIA)
[ ] Domain 5: Reporting and Communication (Post-Exploitation & Cleanup)
CEH (Certified Ethical Hacker)
[ ] Domain 1: Information Security Overview (Cyber Kill Chain vs. Diamond Model)
SecAI+
[ ] AI Security: Analyzing AI-Driven Attacks via Behavioral Indicators (IOA)
[Timestamps]
0:00 - Intro: When the Enemy is Already Inside
0:23 - Case Study: Salt Typhoon (APT & Living off the Land)
1:10 - Phase 1: Preparation (Playbooks & Visibility)
1:31 - Phase 2: Detection & Analysis (IOC vs. IOA)
2:20 - The Diamond Model: Adversary, Capability, Infrastructure, Victim
2:53 - Phase 3: Containment (Micro-segmentation vs. Shutdown)
3:20 - Phase 4: Eradication & Recovery (Rootkits & Registry Keys)
3:35 - Digital Forensics: Order of Volatility (RAM vs. Disk)
4:08 - Legal Hold & Chain of Custody (Admissibility)
4:42 - Data Sovereignty: GDPR & Cross-Border Forensics
5:14 - Summary: Speed is Good, Accuracy is Survival
5:36 - Outro: Stay Safe, Stay Secure.
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: