Sponsored by Keepnet Labs

Forensics

Artificial Intelligence: The Ultimate Weapon in the War against Cyber Criminals

For a legion of cybersecurity experts from across the globe, CISO MAG hosted a Fireside Chat with Dr. Erdal Ozkaya on the topic, “AI: The Ultimate Weapon in the War against Cyber Criminals.” Dr. Ozkaya is a an award-winning CISO of a regional bank. The Fire Chat was moderated by Brian Pereira, Principal Editor of CISO MAG, who interviewed Dr Erdal. It [...]


Forensic investigation of a Social Engineering attack, from real life

In this article I am going to share with you a real Social Engineering attack , where we worked in a case to investigate if there was any forensic evidence to suggest that the laptop computer a) had been compromised by the perpetrator(s), b) if found to be compromised, how, when, and by whom it was compromised, c) [...]


Logical Operations Certifications Industry Contributor

ssued By Logical Operations / Communispond Earners of the Logical Operations Certifications: Industry Contributor badge have served as Subject Matter Experts and/or Scheme Committee Members for the development of a Logical Operations certification program. They have provided valuable industry expertise regarding the knowledge, skills, and abilities that certificants will be tested on via the certification exam. The holder of this badge [...]


Windows 10 Security in Real Life

As a Network Administrator, do you wonder how Windows 10 can help you protect against everyday security threats? Join popular experts Erdal Ozkaya and Raymond Comvalius for an in-depth look at the most secure Windows ever, and see how to put the new features to work for you right away, as you build up your Windows 10 [...]


CyberSec First Responder

I am proud to announce that I am working with Logical Operations together, along other Cybersecurity Industry Experts on developing their new Course and Exam . About CyberSec First Responder YOU are the first line of defense your organization has against a cyber security attack. Don't leave it to chance. Become CFR certified. By taking an approach where an understanding of [...]


Windows Security & Forensics

Every organization must prepare for the possibility of cybercrime within its networks or on its computer systems. Are you able to investigate crimes, like fraud, insider threats, industrial espionage, employee misuse, and computer intrusion? These days, every IT Pro should learn to recover key intelligence from Windows systems. Learn how to do just that, from leading [...]


Windows Authentication Attacks and Forensics

Windows Authentication Attacks and Forensics See demonstrations of how attackers use credential dependencies to gain elevated access to systems and to perform lateral movement. Plus, learn how to detect and prevent many of these attacks.


Posted By Category: Cyber Security, Forensics, Video TutorialsComments: 0