Attended webinar “When Cybercriminals Hide in Plain Sight: Hacking Platforms You Know and Trust” by KnowBe4
Finished “Incident Response Steps” on Cybrary.it
In Incident Response Steps, David Biser accentuates the significance of planning out a response for when an incident occurs. He lays out an overview of the important steps of an incident response plan and gives a breakdown of each step.
Finished “Incident Response Recovery” on Cybrary.it
Incident Response Recovery covers the actual recovery process from an incident that was identified and managed. It goes over the proper documentation necessary after the incident is handled, the legal concerns associated with the incident, and the lessons learned.
Finished “Command Line Basics” on Cybrary.it
In this course you will learn the fundamentals of Command Line, a fundamental tool for any user of Windows and Linux machines. Command line allows developers to manipulate files easily and quickly. Learning command line saves developers time and resources.
Finished “DFIR Investigations and Witness Testimony” on Cybrary.it
Is it time for you to testify? This course is for digital forensics and incident response professionals who are preparing to testify. Learn more about what makes an expert witness, as well as what is involved in the process from collection and analysis to testimony. Gain confidence with defending your work before you take the […]
Finished “Analyzing Attacks for Incident Handlers” on Cybrary.it
An important but often overlooked process in incident handling is memory analysis. In this installment of David Biser’s series on incident response, he explains and demonstrates how to use memory analysis to investigate an attack and gain useful evidence from memory that may not otherwise be available.
Finished “Attacks and Persistence for Incident Handlers” on Cybrary.it
Hone your incident handling skills by joining Ken Underhill in this Attacks and Persistence for Incident Handlers course. Identify DNS and USB attacks and walk through a session hijacking lab to understand how an attacker can exploit a session to harvest user credentials.
Finished “Scanning and Enumeration with NMAP” on Cybrary.it
NMAP is a powerful tool used by both attackers and defenders to scan networks. In this Scanning and Enumeration with NMAP course, Ken Underhill uses an NMAP lab to demonstrate the process for collecting information on a network using technical tools. Become a more advanced incident handler with this course.
Finished “Online Reconnaissance” on Cybrary.it
If you’re on the path to becoming an incident handler, you’ll need reconnaissance skills. In this Online Reconnaissance course, Ken Underhill covers the gathering of data through reconnaissance-related labs, with a primary focus on open-source intelligence (OSINT). Examine analysis labs to give you a hands-on overview of information gathering.