<p><b>A practical guide to deploying digital forensic techniques in response to cyber security incidents</b></p><h4>Key Features</h4><ul><li>Learn incident response fundamentals and create an effective incident response framework</li><li>Master forensics investigation utilizing digital investigative
Digital Forensics and Incident Response: A practical guide to deploying digital forensic techniques in response to cyber security incidents
โ Scribed by Gerard Johansen
- Publisher
- Packt Publishing
- Year
- 2017
- Tongue
- English
- Leaves
- 316
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Key Features
โข Learn incident response fundamentals and create an effective incident response framework
โข Master forensics investigation utilizing digital investigative techniques
โข Contains real-life scenarios that effectively use threat intelligence and modeling techniques
Book Description
Digital Forensics and Incident Response will guide you through the entire spectrum of tasks associated with incident response, starting with preparatory activities associated with creating an incident response plan and creating a digital forensics capability within your own organization. You will then begin a detailed examination of digital forensic techniques including acquiring evidence, examining volatile memory, hard drive assessment, and network-based evidence. You will also explore the role that threat intelligence plays in the incident response process. Finally, a detailed section on preparing reports will help you prepare a written report for use either internally or in a courtroom.
By the end of the book, you will have mastered forensic techniques and incident response and you will have a solid foundation on which to increase your ability to investigate such incidents in your organization.
What you will learn
โข Create and deploy incident response capabilities within your organization
โข Build a solid foundation for acquiring and handling suitable evidence for later analysis
โข Analyze collected evidence and determine the root cause of a security incident
โข Learn to integrate digital forensic techniques and procedures into the overall incident response process
โข Integrate threat intelligence in digital evidence analysis
โข Prepare written documentation for use internally or with external parties such as regulators or law enforcement agencies
About the Author
Gerard Johansen is an information security professional with over a decade of experience in such areas as penetration testing, vulnerability management, threat assessment modeling, and incident response. Beginning his information security career while a cybercrime investigator, Gerard has built on that experience while working as a consultant and security analyst for clients and organizations ranging from healthcare to finance. Gerard is a graduate of Norwich University's Masters of Science in Information Assurance and a Certified Information Systems Security Professional.
Gerard is currently employed as an Enterprise Security Manager with a large retailer with a focus on incident detection, response and threat intelligence integration. He has also contributed to several online publications focused on various aspects of penetration testing.
โฆ Table of Contents
- Incident Response
- Forensic Fundamentals
- Network Evidence Collection
- Host-Based Evidence
- Understanding Forensic Imaging
- Network Evidence Analysis
- Analyzing System Memory
- Analyzing System Storage
- Forensic Reporting
- Malware Analysis
- Threat Intelligence
โฆ Subjects
Security; Forensic Analysis; Memory; Incident Response; Malware Analysis; Networking; Evidence Extraction; Planning; Threat Models; Reporting; Forensic Imaging; Forensics; Computer Security Incident Response Team
๐ SIMILAR VOLUMES
The staggeringly high number of reported breaches in the last several years has shown that the ability to rapidly respond to attacks is a vital capability for all organizations. An understanding of how digital forensics integrates with the overall response to cyber security incidents is a must for a
The staggeringly high number of reported breaches in the last several years has shown that the ability to rapidly respond to attacks is a vital capability for all organizations. An understanding of how digital forensics integrates with the overall response to cyber security incidents is a must for a