Book Content
chapters • 11h44m total length
1. Classifying Threats
2. Operating System families and key differences in structure
3. Computer Forensics and Evidence handling
4. Identifying rogue data from a data set
5. Warning signs from network data
6. Network security data analysis
7. Roles and responsibilities during an incident
8. Network and Server Profiling
9. Compliance Frameworks
10. Data Normalization and Exploitation
11. Drawing Conclusions From the Data
12. The Cyber Kill Chain Model
13. Incident Handling Activities
14. Mock Exam 1
15. Mock Exam 2














