The time on a computer is relative to a single time stamp, and the time differs depending on the operating system and file system. In this video, you’ll learn some important points to consider when collecting time information from a computer.
When gathering forensics data, don’t forget to grab the video. In this module, you’ll learn some of the most important video sources to gather during the forensics process.
The information traversing the network can be a valuable source of forensic data. In this video, you’ll learn about some common data gathering techniques for network traffic data.
A common forensics method is to gather an image of an entire system. In this video, you’ll learn about system images, and some of the hardware and software tools available to make an image.
When you start gathering forensics data, where should you start? In this video, you’ll learn about the order of volatility and which data sticks around the longest.
Data loss can be devastating without the proper policies in place. In this video, you’ll learn how to mitigate the issues related to data loss and theft of your computers and data.
Without proper auditing, we’d have no way to know how secure our environment might be. In this video, you’ll learn about security auditing and what kinds of audits are the most effective.
Setting the correct rights and permissions can be an important part of mitigating risk. In this video, you’ll learn the importance of properly setting user rights and properly auditing those permissions.
The question isn’t if an incident is going to occur; it’s when. In this video, you’ll learn about the incident management process and some techniques for minimizing the risk should an incident occur.
The only thing static on our network is constant change. In this video, you’ll learn how change control management can make a difference in mitigating risk in your organization.