From the course: CCSP Cert Prep: 5 Cloud Security Operations Audio Review
Unlock the full course today
Join today to access over 22,500 courses taught by industry experts or purchase this course individually.
Investigations and forensics
From the course: CCSP Cert Prep: 5 Cloud Security Operations Audio Review
Investigations and forensics
- [Instructor] Digital forensic techniques allow us to investigate what happened during a security incident. In chapter nine, I covered investigations and forensics. Let's review some of the key points. (air whooshes) First, different types of investigations have different purposes. Operational investigations seek to investigate technical issues with our infrastructure. (air whooshes) Criminal investigations look into possible violations of criminal law that may result in somebody serving time in prison. (air whooshes) Civil investigations seek to resolve potential violations of civil law, such as contract disputes. And regulatory investigations are those conducted by government agencies and other regulators looking into compliance issues. (air whooshes) Digital forensics is the field of gathering evidence from electronic systems during an investigation. When we conduct digital forensic investigations, we must follow…
Contents
-
-
-
Physical and logical infrastructure2m 54s
-
Physical and logical infrastructure: Q&A2m
-
Secure infrastructure operations2m 50s
-
Secure infrastructure operations: Q&A1m 18s
-
Network operations2m 36s
-
Network operations: Q&A1m 11s
-
Network security2m 28s
-
Network security: Q&A1m 51s
-
Security baselines and standards2m 32s
-
Security baselines and standards: Q&A1m 39s
-
Monitoring2m 11s
-
Monitoring: Q&A1m 37s
-
Threat assessment2m 10s
-
Threat assessment: Q&A1m 35s
-
Incident management1m 47s
-
Incident management: Q&A1m 23s
-
Investigations and forensics1m 51s
-
Investigations and forensics: Q&A1m 25s
-
-