Windows Security and Forensics 2 Windows Security and Forensics Take a look at the current state of the security landscape, Windows Security, and what “computer forensics” are. https://youtu.be/Q93PNawX0RU Watch the Video’s in YouTube For more Video Tutorials Erdal
Windows Security and Forensics Every organization must prepare for the possibility of cybercrime within its networks or on its computer systems. Are you able to investigate crimes, like fraud, insider threats, industrial espionage, employee misuse, and computer intrusion? These days, every IT Pro should learn to recover key intelligence from Windows systems. Learn how to […]
Windows Authentication Attacks and Forensics See demonstrations of how attackers use credential dependencies to gain elevated access to systems and to perform lateral movement. Plus, learn how to detect and prevent many of these attacks.
1 | Windows Security and Forensics Take a look at the current state of the security landscape, Windows Security, and what “computer forensics” are.
2 | Windows Memory Attacks and Forensics Learn how and why hackers attack a system’s memory and see how Memory Forensics can help address the problem.
3 | Windows Authentication Attacks and Forensics See demonstrations of how attackers use credential dependencies to gain elevated access to systems and to perform lateral movement. Plus, learn how to detect and prevent many of these attacks.
4 | Windows Forensics Explore Digital Forensics and find out what to do as a first responder to preserve evidence for legal actions.
5 | Network Forensics Explore network forensics, along with with case studies, best practices, and online analysis techniques.
6 | Malware Incident Response Learn about malware incident response, including identifying, locating, and removing malware.
Network Forensics Network Forensics Explore network forensics, along with case studies, best practices, and online analysis techniques. More Video’s This is the 3th and last video of this course Is your organization moving toward the cloud? If you are in IT today, the answer is most likely yes. And, that being the case, […]
Every organization must prepare for the possibility of cybercrime within its networks or on its computer systems. Are you able to investigate crimes, like fraud, insider threats, industrial espionage, employee misuse, and computer intrusion? These days, every IT Pro should learn to recover key intelligence from Windows systems.
Learn how to do just that, from leading expert Erdal Ozkaya, and find out what you need to become a digital forensic professional, incident responder, and media exploitation expert, capable of piecing together Windows system events, second by second. Erdal joins forces with Hasain “the Wolf” Alshakarti and Raymond Comvalius to show how cybercrime happens, what you can do to prevent it, and how to respond when it occurs.
Windows Security & Forensics: Coming Soon Windows Security & Forensics Very soon there will be a new Microsoft Virtual Academy Course available to watch , which will cover Windows , Security and Forensics’. Keep an eye at MVA web site and my blog for details. Every organization must prepare for cyber-crime occurring on their computer […]
Zombies in Social Networks We have arrived in a time where social networks have become an essential part of our lives. People are spending a great deal of time to connect with organizations, businesses, and individuals all over the world. But there is a dark side to social networks. How do you protect your business […]