The basics of forensics are important topics for any technologist. In this video, you’ll learn about first responders, legal hold, eDiscovery, data collection, chain of custody, and much more.
The complexity of mobile device security is compounded when the user community takes advantage of “bring your own device.” In this video, you’ll learn some security best practices around securing these user-owned mobile devices.
If a security event occurs in your organization, how would you handle it? In this video, you’ll learn some of the techniques used when dealing with a security incident.
If you’re the first one on the scene of a security event, there are a number of best practices to consider. In this video, you’ll learn which tasks the first person on a scene need to follow and how to handle the evidence you find.
Accounting for costs and preventing further damage are important aspects of security forensics. In this video, you’ll learn about expense accounting and methods for limiting the damage of a security event.
The state of a computer screen and a statement from a witness can be powerful forensics data when captured properly. In this video, you’ll learn how to gather forensics information directly from the screen and important considerations when taking witness statements.
Taking hashes during the forensics process can provide valuable verification later. In this video, you’ll learn about digest ciphers and other methods for verifying data.
When gathering forensics data, don’t forget to grab the video. In this module, you’ll learn some of the most important video sources to gather during the forensics process.