Incident Response and Computer Forensics on Rootkits
Lets pick up where we left off with the rootkit and post-exploitation video (http://www.youtube.com/watch?v=izv1b-BTQFw). Except, we are now doing incident response.
First you'll see some normal live forensics on the victim and come up with nothing. Then we show how using network forensics techniques (looking at the victim from the outside) we start to see clear evidence of "doh! we've been owned".
We walk through how to see these signs and prove to them that what Windows and traditional forensics is telling them is a LIE in this particular investigation.
You'll learn how to do this type of forensics technique and many more from our InfoSec Institute Computer Forensics Boot Camp: http://www.infosecinstitute.com/courses/computer_forensics_training.html
MORE ON INFOSEC INSTITUTE
Recognized as a 2018 Gartner Peer Insights Customers’ Choice for Security Awareness Computer-Based Training, InfoSec Institute fortifies organizations of all sizes against security threats with its award-winning security education solutions.
Recognizing that cybersecurity is everyone’s job, the company provides skills training and certification prep courses for security professionals while building the entire workforce’s security aptitude through awareness training and phishing simulations. InfoSec Institute is a Training Industry “Top 20 IT Training Company” and the Security Training & Education Program Gold Winner in Info Security Products Guide’s Global Excellence Awards.
Additional information can be found here:
- SecurityIQ awareness and anti-phishing platform: https://www.infosecinstitute.com/securityiq/
- InfoSec training and certification: https://www.infosecinstitute.com/flex
- InfoSec training and certification features: https://www.infosecinstitute.com/flex/pro/
- InfoSec training and certification guarantees: https://www.infosecinstitute.com/flex/guarantees/
- 100+ training and certification courses: https://www.infosecinstitute.com/courses
Видео Incident Response and Computer Forensics on Rootkits канала Infosec
First you'll see some normal live forensics on the victim and come up with nothing. Then we show how using network forensics techniques (looking at the victim from the outside) we start to see clear evidence of "doh! we've been owned".
We walk through how to see these signs and prove to them that what Windows and traditional forensics is telling them is a LIE in this particular investigation.
You'll learn how to do this type of forensics technique and many more from our InfoSec Institute Computer Forensics Boot Camp: http://www.infosecinstitute.com/courses/computer_forensics_training.html
MORE ON INFOSEC INSTITUTE
Recognized as a 2018 Gartner Peer Insights Customers’ Choice for Security Awareness Computer-Based Training, InfoSec Institute fortifies organizations of all sizes against security threats with its award-winning security education solutions.
Recognizing that cybersecurity is everyone’s job, the company provides skills training and certification prep courses for security professionals while building the entire workforce’s security aptitude through awareness training and phishing simulations. InfoSec Institute is a Training Industry “Top 20 IT Training Company” and the Security Training & Education Program Gold Winner in Info Security Products Guide’s Global Excellence Awards.
Additional information can be found here:
- SecurityIQ awareness and anti-phishing platform: https://www.infosecinstitute.com/securityiq/
- InfoSec training and certification: https://www.infosecinstitute.com/flex
- InfoSec training and certification features: https://www.infosecinstitute.com/flex/pro/
- InfoSec training and certification guarantees: https://www.infosecinstitute.com/flex/guarantees/
- 100+ training and certification courses: https://www.infosecinstitute.com/courses
Видео Incident Response and Computer Forensics on Rootkits канала Infosec
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Finding a cybersecurity job: How to narrow career options | Cyber Work PodcastHow I Passed CompTIA Network + in 30 Days | 2022 Study Tools and Tips |What does a security engineer do? | Cybersecurity Career SeriesCybersecurity jobs: How to better apply, get hired and fill open roles | Cyber Work PodcastWhat does an ICS security practitioner do? | Cybersecurity Career SeriesUsing the AustCyber Education MapAsk a Fraud AnalystWhat does a secure coder do? | Cybersecurity Career SeriesHow To Install OWASP Juice Shop on Kali Linux | 2022How to do application security right in your organization | Infosec Edge WebcastWorking as a privacy manager | Cybersecurity Career SeriesCompTIA CASP+ CAS-004 Advanced Security Practitioner E-Learning Training DEMOWhat does a cybersecurity beginner do? | Cybersecurity Career SeriesTips to pass your IAPP certification exam | Cyber Work LiveFact or fiction: “Employees are your weakest cybersecurity link” | Cyber Work Podcast[Kep1er - WA DA DA] Hot Debut Stage | #엠카운트다운 EP.735 | Mnet 220113 방송Fact or fiction: “It’s not if you get breached, but when” | Cyber Work PodcastEthical user data collection and machine learning | Cyber Work PodcastA public discussion about privacy careers: Training, certification and experience | Cyber Work Live