-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Digital Forensics and Incident Response
By :

Digital Forensics and Incident Response
By:
Overview of this book
An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization’s infrastructure from attacks. This updated third edition will help you perform cutting-edge digital forensic activities and incident response with a new focus on responding to ransomware attacks.
After covering the fundamentals of incident response that are critical to any information security team, you’ll explore incident response frameworks. From understanding their importance to creating a swift and effective response to security incidents, the book will guide you using examples. Later, you’ll cover digital forensic techniques, from acquiring evidence and examining volatile memory through to hard drive examination and network-based evidence. You’ll be able to apply these techniques to the current threat of ransomware. As you progress, you’ll discover the role that threat intelligence plays in the incident response process. You’ll also learn how to prepare an incident response report that documents the findings of your analysis. Finally, in addition to various incident response activities, the book will address malware analysis and demonstrate how you can proactively use your digital forensic skills in threat hunting.
By the end of this book, you’ll be able to investigate and report unwanted security breaches and incidents in your organization.
Table of Contents (28 chapters)
Preface
In Progress
| 0 / 9 sections completed |
0%
Part 1: Foundations of Incident Response and Digital Forensics
In Progress
| 0 / 1 sections completed |
0%
Chapter 1: Understanding Incident Response
In Progress
| 0 / 9 sections completed |
0%
Chapter 2: Managing Cyber Incidents
In Progress
| 0 / 9 sections completed |
0%
Chapter 3: Fundamentals of Digital Forensics
In Progress
| 0 / 8 sections completed |
0%
Chapter 4: Investigation Methodology
In Progress
| 0 / 8 sections completed |
0%
Part 2: Evidence Acquisition
In Progress
| 0 / 1 sections completed |
0%
Chapter 5: Collecting Network Evidence
In Progress
| 0 / 10 sections completed |
0%
Chapter 6: Acquiring Host-Based Evidence
In Progress
| 0 / 9 sections completed |
0%
Chapter 7: Remote Evidence Collection
In Progress
| 0 / 7 sections completed |
0%
Chapter 8: Forensic Imaging
In Progress
| 0 / 9 sections completed |
0%
Part 3: Evidence Analysis
In Progress
| 0 / 1 sections completed |
0%
Chapter 9: Analyzing Network Evidence
In Progress
| 0 / 8 sections completed |
0%
Chapter 10: Analyzing System Memory
In Progress
| 0 / 8 sections completed |
0%
Chapter 11: Analyzing System Storage
In Progress
| 0 / 9 sections completed |
0%
Chapter 12: Analyzing Log Files
In Progress
| 0 / 8 sections completed |
0%
Chapter 13: Writing the Incident Report
In Progress
| 0 / 9 sections completed |
0%
Part 4: Ransomware Incident Response
In Progress
| 0 / 1 sections completed |
0%
Chapter 14: Ransomware Preparation and Response
In Progress
| 0 / 8 sections completed |
0%
Chapter 15: Ransomware Investigations
In Progress
| 0 / 9 sections completed |
0%
Part 5: Threat Intelligence and Hunting
In Progress
| 0 / 1 sections completed |
0%
Chapter 16: Malware Analysis for Incident Response
In Progress
| 0 / 10 sections completed |
0%
Chapter 17: Leveraging Threat Intelligence
In Progress
| 0 / 9 sections completed |
0%
Chapter 18: Threat Hunting
In Progress
| 0 / 9 sections completed |
0%
Assessments
In Progress
| 0 / 18 sections completed |
0%
Index
In Progress
| 0 / 2 sections completed |
0%
Other Books You May Enjoy
In Progress
| 0 / 4 sections completed |
0%
Appendix
In Progress
| 0 / 1 sections completed |
0%
Customer Reviews