Book Content
chapters • 14h56m total length
1. Understanding Incident Response
2. Managing Cyber Incidents
3. Fundamentals of Digital Forensics
4. Collecting Network Evidence
5. Acquiring Host-Based Evidence
6. Forensic Imaging
7. Analyzing Network Evidence
8. Analyzing System Memory
9. Analyzing System Storage
10. Analyzing Log Files
11. Writing the Incident Report
12. Malware Analysis for Incident Response
13. Leveraging Threat Intelligence
14. Hunting for Threats
15. Appendix














