Forensics Fundamentals
File Systems
Hard Disk Drive Basics
Forensics Process [Practical]
Digital Evidence and Handling
Order of Volatility
Chain of Custody
Hashing & Integrity
Email Forensics
How Electronic Mail Works
Anatomy of an Email
What is Phishing?
Types of Phishing
Spear Phishing
Whaling
Impersonation
Typosquatting and Homographs
Sender Spoofing
URL Shortening
Business Email Compromise
Analysing Phishing Emails [Practical]
Analysing Artifacts
Business Email Compromise
Red Flags of Phishing Emails
URL Reputation
File Reputation
SPF
DKIM
DMARC
Manual & Automated Analysis
Incident Response
Introduction to Incident Response
What is an Incident Response?
Why is IR Needed?
Incident Response Lifecycle – NIST SP 800 61r2
Incident Response Plan: Preparation, Detection & Analysis, Containment, Eradication, Recovery, Lessons Learned
Incident Response and Security Operations Integration
Case Study: Cyber Kill Chain in Incident Response
Lockheed Martin Cyber Kill Chain
What is it, why is it used ?
Case Study: Monero Crypto-Mining
MITRE ATT&CK Framework [Practical]
What is it, why is it used ?
Matrices in Mitre
Mapping Data with Mitre
Case Study 1: APT3
Case Study 2: OilRig