Forensics

Forensic investigation of a Social Engineering attack, from real life

In this article I am going to share with you a real Social Engineering attack , where we worked in a case to investigate if there was any forensic evidence to suggest that the laptop computer a) had been compromised by the perpetrator(s), b) if found to be compromised, how, when, and by whom it was compromised, c) [...]


Logical Operations Certifications Industry Contributor

ssued By Logical Operations / Communispond Earners of the Logical Operations Certifications: Industry Contributor badge have served as Subject Matter Experts and/or Scheme Committee Members for the development of a Logical Operations certification program. They have provided valuable industry expertise regarding the knowledge, skills, and abilities that certificants will be tested on via the certification exam. The holder of this badge [...]


Windows 10 Security in Real Life

As a Network Administrator, do you wonder how Windows 10 can help you protect against everyday security threats? Join popular experts Erdal Ozkaya and Raymond Comvalius for an in-depth look at the most secure Windows ever, and see how to put the new features to work for you right away, as you build up your Windows 10 [...]


CyberSec First Responder

I am proud to announce that I am working with Logical Operations together, along other Cybersecurity Industry Experts on developing their new Course and Exam . About CyberSec First Responder YOU are the first line of defense your organization has against a cyber security attack. Don't leave it to chance. Become CFR certified. By taking an approach where an understanding of [...]


Windows Security & Forensics

Every organization must prepare for the possibility of cybercrime within its networks or on its computer systems. Are you able to investigate crimes, like fraud, insider threats, industrial espionage, employee misuse, and computer intrusion? These days, every IT Pro should learn to recover key intelligence from Windows systems. Learn how to do just that, from leading [...]


Windows Authentication Attacks and Forensics

Windows Authentication Attacks and Forensics See demonstrations of how attackers use credential dependencies to gain elevated access to systems and to perform lateral movement. Plus, learn how to detect and prevent many of these attacks.


Posted By Category: Cyber Security, Forensics, Video TutorialsComments: 0

Windows Forensics

Windows Forensics Explore Digital Forensics, and find out what to do as a first responder to preserve evidence for legal actions.


Posted By Category: Forensics, Video TutorialsComments: 0