Published: 19 December 2015
Every organization must prepare for the possibility of cybercrime within its networks or on its computer systems. Are you able to investigate crimes, like fraud, insider threats, industrial espionage, employee misuse, and computer intrusion? These days, every IT Pro should learn to recover key intelligence from Windows systems.
Learn how to do just that, from leading expert Erdal Ozkaya, and find out what you need to become a digital forensic professional, incident responder, and media exploitation expert, capable of piecing together Windows system events, second by second. Erdal joins forces with Hasain “the Wolf” Alshakarti and Raymond Comvalius to show how cybercrime happens, what you can do to prevent it, and how to respond when it occurs.
1 | Windows Security and Forensics
Take a look at the current state of the security landscape, Windows Security, and what "computer forensics" are.
2 | Windows Memory Attacks and Forensics
Learn how and why hackers attack a system's memory, and see how Memory Forensics can help address the problem.
3 | Windows Authentication Attacks and Forensics
See demonstrations of how attackers use credential dependencies to gain elevated access to systems and to perform lateral movement. Plus, learn how to detect and prevent many of these attacks.
4 | Windows Forensics
Explore Digital Forensics, and find out what to do as a first responder to preserve evidence for legal actions.
5 | Network Forensics
Explore network forensics, along with case studies, best practices, and online analysis techniques.
6 | Malware Incident Response
Learn about malware incident response, including identifying, locating, and removing malware.
7 | Windows 10 Forensics
Take a look at Windows 10 forensics, and hear about new security features and innovations that can help forensic experts with their work.Learn
•Examine how and why hackers attack a system's memory.
•Identify how attackers use credential dependencies to gain elevated access.
•Review what to do as a first responder to an attack; learn to preserve evidence for legal actions.
•Explore network forensics.
•Learn about innovations of Windows 10 that can help forensic experts do their jobs.
•Learn the basics of computer forensics.
•See how to respond to malware incident
Did you ever wanted to become an Ethical ...
This short course is designed to partially ...
Penetration Testing Framework 0.58 This post ...
If you are trying to use the ...
Speakers: Alan Burchill, Jeremy Moskowitz, ...
Since I have starterd to work for Kemp ...
Did you miss the life sessions for EC Council ...
Microsoft Egypt is Hiring ! If you are based in ...
Articles Most Read
- Certified Ethical Hacking course for FREE
- Free Course :EC Council Network Security Administrator
- Penetration Testing Framework 0.58
- Fix: Couldn’t connect to the source mailbox
- Desktop Security with Windows 7 Applocker, Bitlocker, Forefront End Point Protection
- NLB vs Hardware Load Balancer
- EC Council ENSA Online Course
- Microsoft Egypt is Hiring
- Fix: Exchange Server 2010 SP update errors
- E-Mail Crimes and Violations (how the leakage could occur)