ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

SANS DFIR WEBCAST - Network Forensics What Are Your Investigations Missing

Автор: SANS Digital Forensics and Incident Response

Загружено: 2015-02-06

Просмотров: 14084

Описание: Traditionally, computer forensic investigations focused exclusively on data from the seized media associated with a system of interest.
Recently, memory analysis has become an integral part of forensic analysis, resulting in a new and significantly different way for digital examiners and investigators to perform their craft.

Now another evolution in computer forensics is at hand - one that includes data collected from network devices as well as the from wires themselves. Every day, more and more network-enabled products hit the market. Incorporating network data from those devices during the analytic process is critical for providing a complete understanding of the event under investigation. Even in traditional data-at-rest examinations, the network may hold the only clues left behind by a diligent attacker that has covered his or her tracks.

We'll discuss how network-based evidence can support traditional data-at-rest computer forensic analysis. Other topics will include the sources and methodologies for collecting network evidence. By knowing what existing data to ask for and what additional data to collect during an investigation, we can provide a more comprehensive analysis of the event at hand.

by Phil Hagen

Philip Hagen has been working in the information security field since 1998, running the full spectrum including deep technical tasks, management of an entire computer forensic services portfolio, and executive responsibilities.

Currently, Phil is an Evangelist at Red Canary, where engages with current and future customers of Red Canary's managed threat detection service to ensure their use of the service is best aligned for success in the face of existing and future threats.

Phil started his security career while attending the US Air Force Academy, with research covering both the academic and practical sides of security. He served in the Air Force as a communications officer at Beale AFB and the Pentagon. In 2003, Phil shifted to a government contractor, providing technical services for various IT and information security projects. These included systems that demanded 24x7x365 functionality. He later managed a team of 85 computer forensic professionals in the national security sector. He has provided forensic consulting services for law enforcement, government, and commercial clients prior to joining the Red Canary team. Phil is also a certified instructor for the SANS Institute, and is the course lead and co-author of FOR572, Advanced Network Forensics and Analysis.

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
SANS DFIR WEBCAST - Network Forensics What Are Your Investigations Missing

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Next Level in Cyber Threat Intelligence Training: New FOR578 course updates

Next Level in Cyber Threat Intelligence Training: New FOR578 course updates

SANS DFIR Webcast - Memory Forensics for Incident Response

SANS DFIR Webcast - Memory Forensics for Incident Response

SANS DFIR Webcast - Incident Response Event Log Analysis

SANS DFIR Webcast - Incident Response Event Log Analysis

Анализ заголовков электронных писем и криминалистическое расследование

Анализ заголовков электронных писем и криминалистическое расследование

Эпизод 1 — Введение в цифровую криминалистику и расследования | Компьютерная криминалистика: объя...

Эпизод 1 — Введение в цифровую криминалистику и расследования | Компьютерная криминалистика: объя...

Ваш интернет-провайдер следит за всем — исправьте это с помощью DNS-фильтрации!

Ваш интернет-провайдер следит за всем — исправьте это с помощью DNS-фильтрации!

Правда о клонировании SIM-карт

Правда о клонировании SIM-карт

Эпштейн. Планетарный ужас

Эпштейн. Планетарный ужас

DFIR 101: Digital Forensics Essentials | Kathryn Hedley

DFIR 101: Digital Forensics Essentials | Kathryn Hedley

Лучший документальный фильм про создание ИИ

Лучший документальный фильм про создание ИИ

КАК УСТРОЕН TCP/IP?

КАК УСТРОЕН TCP/IP?

Introduction to Memory Forensics

Introduction to Memory Forensics

Incident Response in the Cloud (AWS) - SANS Digital Forensics & Incident Response Summit 2017

Incident Response in the Cloud (AWS) - SANS Digital Forensics & Incident Response Summit 2017

SANS SIFT - NTUSER.DAT Forensics Challenge Walkthrough

SANS SIFT - NTUSER.DAT Forensics Challenge Walkthrough

Advanced Wireshark Network Forensics - Part 1/3

Advanced Wireshark Network Forensics - Part 1/3

Triage Collection and Timeline Analysis with KAPE

Triage Collection and Timeline Analysis with KAPE

Российский рынок ноутбуков, кто номер один. Анализ 2025-2026 годов

Российский рынок ноутбуков, кто номер один. Анализ 2025-2026 годов

DNS Evidence  You Don’t Know What You’re Missing

DNS Evidence You Don’t Know What You’re Missing

Investigating Malware Using Memory Forensics - A Practical Approach

Investigating Malware Using Memory Forensics - A Practical Approach

Digital Forensic Memory Analysis - Volatility

Digital Forensic Memory Analysis - Volatility

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]