- What is cybercrime?
- Cybersecurity incident response
- Digital forensic investigations
- Types of evidence
- Creating a forensic tool kit
- Our cyber incident response scenario
- Analyzing the data
- Importing evidence into autopsy
- Analyzing hidden and deleted files
- Analyzing data from the Windows Registry
- Conducting log analysis
- Creating your report
Skill Level Beginner
- [Jason] Imagine you had to deliver the bad news to an employee that they were being let go. During your discussion they say, "That's fine, I'll just go out and start my own firm." And that's when it hits you, this employee may be planning to grab the client files before they leave to ensure they can poach your firm's clients and start over again. What can you do? Well this is one example of a time where you may enter the world of digital forensics and computer incident response. You notify your firm's information security team of your suspicions and they get to work trying to recreate a timeline of all of the actions that this newly terminated employee has conducted on the network over the past few weeks. Like a detective piecing together clues, these digital security experts are crafting a narrative of what the user has done in the system, when they did, and what the repercussions may be. This course is designed to provide you with an exceptional review of both the incident response life cycle and the use of introductory digital forensics by providing hands on demonstrations of various tools and techniques used by real world professionals in the field. My name is Jason Dion, and I've been working in the IT and cyber security industry for over 20 years. During that time I've held positions as an IT director, the leader of numerous incident response teams, and a digital forensic examiner. I invite you to join me in my LinkedIn Learning Course as we go through a thorough introduction into the world of digital forensics and computer incident response.