Book Content
chapters • 17h44m total length
1. Understanding Incident Response
2. Managing Cyber Incidents
3. Fundamentals of Digital Forensics
4. Investigation Methodology
5. Collecting Network Evidence
6. Acquiring Host-Based Evidence
7. Remote Evidence Collection
8. Forensic Imaging
9. Analyzing Network Evidence
10. Analyzing System Memory
11. Analyzing System Storage
12. Analyzing Log Files
13. Writing the Incident Report
14. Ransomware Preparation and Response
15. Ransomware Investigations
16. Malware Analysis for Incident Response
17. Leveraging Threat Intelligence
18. Threat Hunting














