If a security event occurs in your organization, how would you handle it? In this video, you’ll learn some of the techniques used when dealing with a security incident.
If you’re the first one on the scene of a security event, there are a number of best practices to consider. In this video, you’ll learn which tasks the first person on a scene need to follow and how to handle the evidence you find.
Accounting for costs and preventing further damage are important aspects of security forensics. In this video, you’ll learn about expense accounting and methods for limiting the damage of a security event.
The state of a computer screen and a statement from a witness can be powerful forensics data when captured properly. In this video, you’ll learn how to gather forensics information directly from the screen and important considerations when taking witness statements.
Taking hashes during the forensics process can provide valuable verification later. In this video, you’ll learn about digest ciphers and other methods for verifying data.
When gathering forensics data, don’t forget to grab the video. In this module, you’ll learn some of the most important video sources to gather during the forensics process.