SlideShare a Scribd company logo
1 of 33
Download to read offline
ABOUT NETCOM LEARNING
NetCom Learning is an award-winning
global leader in managed learning
services,training and talentdevelopment.
Founded
Headquarters
Delivery Capability
: 1998
: New Y
orkCity
: Worldwide
CEO : Russel Sarder
100K+
Professionals
trained
14K+
C
orporate
clients
3500
IT
,Business&
Soft Skilscourses
96%
Of customers
recommend usto others
8.6/9
Instructor
evaluations
20+
Leadingvendors
recognitions
Microsoft’s
Worldwide training
partner of the year
80%
Trained ofthe
Fortune 100
T
op20
ITTraining
Company
Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | eccouncil@netcomlearning.com
© 1998-2022 NetCom Learning
CLICK HERE TO WATCH
Access the Recorded Session here!
© Interested in training? Contact us! | www.netcomlearning.com |
© 1998-2022 NetCom Learning (888) 563-8266 | eccouncil@netcomlearning.com
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com
| | |
AGENDA
Overview of Multi-Stage Network Breaches
Understanding Forensic Investigation
3 Key Tools and Techniques to Perform Forensic Analysis
Q&A with Speaker
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com
| | |
IMPORTANCE OF COMPUTER FORENSICS PROCESS
• The investigators must follow a forensic investigation process that comply to local laws and established
precedents
• As digital evidence is fragile, a proper investigation process that ensures the integrity of evidence is
critical to prove a case in court.
• The investigators must follow a repeatable and well documented steps
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com
| | |
EVERY CRIME LEAVES A TRAIL OF EVIDENCE!
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com
| | |
MULTI-STAGE ATTACKS ARE MAKING NETWORK DEFENSE
DIFFICULT!
• Multi-stage attack typically includes an initial dropper file, a main payload component of the malware,
and additional modules delivered over a period of days, weeks, or more.
• IT managers are inundated with cyberattacks coming from all directions and are struggling to keep up
due to a lack of security expertise, budget and up to date technology, according to Sophos.
• Cybercriminals use multiple attack methods and payloads for maximum impact
• Cybercriminals are evolving their attack methods and often use multiple payloads to maximize profits
• Organizations that are only patching externally facing high-risk servers are left vulnerable internally
and cybercriminals are taking advantage of this and other security lapses.
• Software exploits, unpatched vulnerabilities and/or zero-day threats are top security risk
• Lack of security expertise, budget and up to date technology.
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com
| | |
6 STAGES OF A NETWORK INTRUSION
• Reconnaissance
• Initial Exploitation
• Establish Persistence
• Install Tools
• Move Literally
• Achieve Objective
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com
| | |
COMPUTER FORENSICS
• Set of methodological procedures and techniques
• Finding evidence related to a digital crime, to find the culprits and initiate legal action against them.
Objectives:
To gather evidence
To track and
prosecute cyber
criminals.
To minimize losses to
the organization
To protect the
organization from
similar incidents in
future
Intent of perpetrator
Cybercrime- Any illegal act that involving a computer device, network or application
Internal- Breach of Trust by disgruntled employees
External- Attackers
• Company becomes target of intrusions every 15 minutes from external source
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com
| | |
TYPES OF FORENSICS
• Network forensics
• Email forensics
• Malware forensics
• Memory forensics
• Cell Phone forensics
• Database forensics
• Disk forensics
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com
| | |
CYBER CRIME INVESTIGATION
• Collection of clues and forensic evidence
• There will be at least one electronic device found during the investigation.
• The electronic device found may be central to the investigation, as it could contain valuable
evidence for solving the case.
• Therefore, the information contained in this device must be investigated in the proper manner
• Process such as collection, process and analysis of data differ based on the type of the case
• Types
• Civil
• Criminal
• Administrative
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com
| | |
RULES OF FORENSIC INVESTIGATION
• Limited access and examination of the original evidence
• Record changes made to evidence files
• Create chain of custody
• Comply with standards
• Hire professionals for analysis
• Evidence should be strictly related to incident
• Securely store evidence
• Use recognized tools for analysis
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com
| | |
DIGITAL EVIDENCE
Digital Evidence:
Any information of probative value that is either stored or transmitted in a digital form.
Locard’s Exchange Principle- “Anyone entering a crime scene takes something of the scene with them,
and leaves something of themselves behind when they leave”
Type
Volatile
Non-Volatile
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com
SOURCES OF POTENTIAL EVIDENCE
• Hard Drive, Thumb Drive, Memory card
• Smart card, Biometric Scanner, Digital Camera
• Routers, Hubs, Switches
• Removable storage device
• Scanners, Fax Machines, GPS
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com
FORENSIC READINESS
Organization’s ability to make optimal use of digital evidence in a limited period of time and
with minimal investigation costs
Benefits
Fast and efficient investigation
Structured storage of evidence- reduces expense and time of investigation
Easy identification of evidence
Gives attackers less time to cover tracks
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com
ROLES AND RESPONSIBILITIES OF FORENSIC INVESTIGATOR
• Determine extent of damage
• Recovers data of investigate value
• Gathers evidence in a forensically manner
• Ensures that evidence is not damaged
• Creates an image of original evidence without tampering to maintain integrity
• Guides officials in carrying out investigation
• Reconstructs the damaged disks or other storage devices, and uncover the information hidden on the
computer
• Analyzes evidence data found
• Prepares analysis report
• Updated organizations about various attacks and recovery techniques.
• Address issue in court
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com
WHAT MAKES A GOOD COMPUTER FORENSIC INVESTIGATOR?
• Interviewing skills to gather much information about case
• Researching skills to know the background activities
• Patience and willingness to work long hours
• Excellent writing skills to detail findings in the report
• Strong analytical skills to find evidence and link it to suspect
• Excellent communication skills to explain findings
• Be updated with new methods and forensic technology
• Well versed in more than one computer platform
• Knowledge of various technologies, hardware, software.
• Honest, ethical and law abiding
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com
PHASES IN THE COMPUTER FORENSICS INVESTIGATION
PROCESS
Pre-
investigation
Phase
Investigation
Phase
Post-
investigation
Phase
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com
COMPUTER FORENSIC INVESTIGATION METHODOLOGY
1. First Response
2. Search and Seizure
3. Collect evidence
4. Secure evidence
5. Data acquisition
6. Data analysis
7. Evidence assessment
8. Documentation & Reporting
9. Testing as an expert witness
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com
3 KEY TECHNIQUES TO PERFORM FORENSIC ANALYSIS
• Preparation/Extraction
• whether there is enough information to proceed, validation of all hardware and software,
duplicates the forensic data provided in the request and verifies its integrity, If examiners get
original evidence, they need to make a working copy and guard the original's chain of custody,
tool selection
• Identification
• Examiners repeat the process of identification for each item on the Extracted Data List, check if
its out of scope
• Analysis
• In the analysis phase, examiners connect all the dots and paint a complete picture for the
requester, examiners answer questions like who, what, when, where, and how.
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com
3 KEY TECHNIQUES TO PERFORM FORENSIC ANALYSIS
• Autopsy/the Sleuth Kit
• The Sleuth Kit is a command-line tool that performs forensic analysis of forensic images of hard
drives and smartphones. Autopsy is a GUI-based system that uses The Sleuth Kit behind the
scenes.
• EnCase
• Encase is an application that helps you to recover evidence from hard drives. It allows you to
conduct an in-depth analysis of files to collect proof like documents, pictures, etc.
• FTK Imager
• FTK Imager is a data preview and imaging tool used to acquire data (evidence) in a forensically
sound manner by creating copies of data without making changes to the original evidence
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com
RELEVANT CERTIFICATION - CHFI
https://www.eccouncil.org/programs/computer-hacking-forensic-investigator-chfi/
Recommended Courses
NetCom Learning offers a comprehensive portfolio for Security
» EC-COUNCIL CHFI: COMPUTER HACKING FORENSIC INVESTIGATOR V10 – Class Scheduled on Oct 17
» EC-COUNCIL CND: CERTIFIED NETWORK DEFENDER V2 - Class Scheduled on Oct 24
» EC-COUNCIL CEH: CERTIFIED ETHICAL HACKER V12 - Class Scheduled on Oct 17
You can also access the below Marketing Assets
» Free 1hr Training - Best Practices to Cybersecurity Vulnerability Assessment and Solutions Implementation
» Free On-Demand Training - Learn Cybersecurity Incident Handling & Response in Under 40 Minutes
» Blog - Top 5 Popular Cybersecurity Certifications for 2022
Interested in training? Contact us! | www.netcomlearning.com |
© 1998-2022 NetCom Learning (888) 563-8266 | eccouncil@netcomlearning.com
Other Marketing Assets
COURSES & CERTIFICATIONS
Interested in training? Contact us! | www.netcomlearning.com |
© 1998-2022 NetCom Learning
OUR FREE VIRTUAL EVENTS BLOGS SAVINGS PROGRAMS & PROMOS
(888) 563-8266 | eccouncil@netcomlearning.com
Stay Digital Safe - Assess and Upskill your team against cyber threats now !
NetCom Learning's end-user Cybersecurity Awareness Training & Phishing Simulation Solution offers phishing simulations on email,
voice, and text to organizations, and is bundled with 90+ interactive security awareness video courses for the end-users.
Request a Demo
Interested in training? Contact us! | www.netcomlearning.com |
© 1998-2022 NetCom Learning (888) 563-8266 | eccouncil@netcomlearning.com
Learning Passport
Flexible Team Training Package
Specifically designed to be customized for the number of learners you
plan to train on top-notch technology providers – including Microsoft,
AWS, Cisco, CompTIA, Adobe, Autodesk, PMI, EC-Council, and more.
Redeemable over 4,000+ official courses
Flexible fund validity of 12 months
Contact Us Now To Schedule your appointment with our learning consultants.
Toll-free Phone: 1-888-563-8266 | Email: info@netcomlearning.com
Learn More
Interested in training? Contact us! | www.netcomlearning.com |
© 1998-2022 NetCom Learning (888) 563-8266 | eccouncil@netcomlearning.com
NetCom
Individual Learner Subscription
Get 24/7 access to unlimited virtual instructor-led and self-paced IT and
business training for 12 months. NetCom+ includes over 250 e-Learning
and 140 virtual instructor led courses across various domains.
$2,999 per learner per year
* Additional discounts available for enterprises
+
Learn More
Interested in training? Contact us! | www.netcomlearning.com |
© 1998-2022 NetCom Learning (888) 563-8266 | eccouncil@netcomlearning.com
Exclusive Government Savings
Solutions For FY22
This fiscal year, take full advantage of your FY22 training budget and strengthen your
workforce's skillset across 9 domains such as Cloud, Security, Networking, Project
Management, and more, delivered by certified instructors - equipped with security
clearance and government and military training experience.
Learning Passport
Experience up to a
100% increase
in purchasing power and
secure your yearly training
Get Special Pricing
Get exclusive Special Pricing
for Government and
Military on courses
up to $3,600
NetCom+ Subscription
Save training dollars and get
unlimited access to
virtual Instructor-led and
on-demand courses
Help teams earn and maintain certifications as per
Department of Defense (DoD) directive 8140
(Formerly known as DoD 8570)
Interested in training? Contact us! | www.netcomlearning.com |
© 1998-2022 NetCom Learning (888) 563-8266 | eccouncil@netcomlearning.com
NetCom Learning serves all Government agencies through our GSA schedule,
47QTCA22D004B.
Our GSA Schedule provides more than 800 classroom training solutions available
for delivery at one of our many training facilities, at your location or at an off-site
that offers maximum convenience.
NetCom Learning is also approved as GSA Small Business for GSA Set Asides.
We accept GSA SmartPay and GCPC credit cards | We participate in GSA Advantage
Interested in training? Contact us! | www.netcomlearning.com |
© 1998-2022 NetCom Learning (888) 563-8266 | eccouncil@netcomlearning.com
Continue your Cybersecurity
Skilling Journey with
Microsoft Security
Fundamentals
You will get access to your free Microsoft Official Courseware on
SC-900T00: Microsoft Security, Compliance, And Identity Fundamentals
in the NetCom365 Learning Portal.
Access Now
Interested in training? Contact us! | www.netcomlearning.com |
© 1998-2022 NetCom Learning (888) 563-8266 | eccouncil@netcomlearning.com
FOLLOW US ON
LinkedIn T
witter YouTube
Instagram
Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | eccouncil@netcomlearning.com
© 1998-2022 NetCom Learning
A BOOK FROM
RUSSELL SARDER
CEO - NETCOM LEARNING
A framework to build a smarter
workforce, adapt to change and drive
growth.
Download
Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | eccouncil@netcomlearning.com
© 1998-2022 NetCom Learning
Thankyou
Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | eccouncil@netcomlearning.com
© 1998-2022 NetCom Learning

More Related Content

Similar to NetCom Learning: Award-Winning Global Leader in Managed Learning Services

Cloud and challenges isacakenya
Cloud and challenges   isacakenyaCloud and challenges   isacakenya
Cloud and challenges isacakenyaTonny Omwansa
 
Curiosity and fourTheorem present: From Coverage Guesswork to Targeted Test G...
Curiosity and fourTheorem present: From Coverage Guesswork to Targeted Test G...Curiosity and fourTheorem present: From Coverage Guesswork to Targeted Test G...
Curiosity and fourTheorem present: From Coverage Guesswork to Targeted Test G...Curiosity Software Ireland
 
Cybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA SystemsCybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA SystemsLiving Online
 
Splunk Phantom, the Endpoint Data Model & Splunk Security Essentials App!
Splunk Phantom, the Endpoint Data Model & Splunk Security Essentials App!Splunk Phantom, the Endpoint Data Model & Splunk Security Essentials App!
Splunk Phantom, the Endpoint Data Model & Splunk Security Essentials App!Harry McLaren
 
NetCom learning webinar cnd first look by netcom learning - network defender fre
NetCom learning webinar cnd first look by netcom learning - network defender freNetCom learning webinar cnd first look by netcom learning - network defender fre
NetCom learning webinar cnd first look by netcom learning - network defender freTuan Yang
 
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...Denim Group
 
ISACA Cloud Computing Risks
ISACA Cloud Computing RisksISACA Cloud Computing Risks
ISACA Cloud Computing RisksMarc Vael
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.pptssusera76ea9
 
Hands on Data Communications, Networking & TCP/IP Troubleshooting
Hands on Data Communications, Networking & TCP/IP TroubleshootingHands on Data Communications, Networking & TCP/IP Troubleshooting
Hands on Data Communications, Networking & TCP/IP TroubleshootingLiving Online
 
Cloud computing in kenya
Cloud computing in kenyaCloud computing in kenya
Cloud computing in kenyaTonny Omwansa
 
RenewData Corporate Brochure
RenewData Corporate BrochureRenewData Corporate Brochure
RenewData Corporate BrochureAlan Brooks
 
Analyst Webinar: Best Practices In Enabling Data-Driven Decision Making
Analyst Webinar: Best Practices In Enabling Data-Driven Decision MakingAnalyst Webinar: Best Practices In Enabling Data-Driven Decision Making
Analyst Webinar: Best Practices In Enabling Data-Driven Decision MakingDenodo
 
Curiosity and Lemontree present - Data Breaks DevOps: Why you need automated ...
Curiosity and Lemontree present - Data Breaks DevOps: Why you need automated ...Curiosity and Lemontree present - Data Breaks DevOps: Why you need automated ...
Curiosity and Lemontree present - Data Breaks DevOps: Why you need automated ...Curiosity Software Ireland
 
(130608) #fitalk ceic 2013 interview
(130608) #fitalk   ceic 2013 interview(130608) #fitalk   ceic 2013 interview
(130608) #fitalk ceic 2013 interviewINSIGHT FORENSIC
 

Similar to NetCom Learning: Award-Winning Global Leader in Managed Learning Services (20)

Cloud and challenges isacakenya
Cloud and challenges   isacakenyaCloud and challenges   isacakenya
Cloud and challenges isacakenya
 
Curiosity and fourTheorem present: From Coverage Guesswork to Targeted Test G...
Curiosity and fourTheorem present: From Coverage Guesswork to Targeted Test G...Curiosity and fourTheorem present: From Coverage Guesswork to Targeted Test G...
Curiosity and fourTheorem present: From Coverage Guesswork to Targeted Test G...
 
new cv
new cvnew cv
new cv
 
Cybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA SystemsCybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA Systems
 
IT_manager
IT_managerIT_manager
IT_manager
 
Splunk Phantom, the Endpoint Data Model & Splunk Security Essentials App!
Splunk Phantom, the Endpoint Data Model & Splunk Security Essentials App!Splunk Phantom, the Endpoint Data Model & Splunk Security Essentials App!
Splunk Phantom, the Endpoint Data Model & Splunk Security Essentials App!
 
NetCom learning webinar cnd first look by netcom learning - network defender fre
NetCom learning webinar cnd first look by netcom learning - network defender freNetCom learning webinar cnd first look by netcom learning - network defender fre
NetCom learning webinar cnd first look by netcom learning - network defender fre
 
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
 
Eyer
EyerEyer
Eyer
 
Emad farahzadi feb 2017
Emad farahzadi   feb 2017Emad farahzadi   feb 2017
Emad farahzadi feb 2017
 
ISACA Cloud Computing Risks
ISACA Cloud Computing RisksISACA Cloud Computing Risks
ISACA Cloud Computing Risks
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
 
Hands on Data Communications, Networking & TCP/IP Troubleshooting
Hands on Data Communications, Networking & TCP/IP TroubleshootingHands on Data Communications, Networking & TCP/IP Troubleshooting
Hands on Data Communications, Networking & TCP/IP Troubleshooting
 
NG-Brochure
NG-BrochureNG-Brochure
NG-Brochure
 
Resume A
Resume AResume A
Resume A
 
Cloud computing in kenya
Cloud computing in kenyaCloud computing in kenya
Cloud computing in kenya
 
RenewData Corporate Brochure
RenewData Corporate BrochureRenewData Corporate Brochure
RenewData Corporate Brochure
 
Analyst Webinar: Best Practices In Enabling Data-Driven Decision Making
Analyst Webinar: Best Practices In Enabling Data-Driven Decision MakingAnalyst Webinar: Best Practices In Enabling Data-Driven Decision Making
Analyst Webinar: Best Practices In Enabling Data-Driven Decision Making
 
Curiosity and Lemontree present - Data Breaks DevOps: Why you need automated ...
Curiosity and Lemontree present - Data Breaks DevOps: Why you need automated ...Curiosity and Lemontree present - Data Breaks DevOps: Why you need automated ...
Curiosity and Lemontree present - Data Breaks DevOps: Why you need automated ...
 
(130608) #fitalk ceic 2013 interview
(130608) #fitalk   ceic 2013 interview(130608) #fitalk   ceic 2013 interview
(130608) #fitalk ceic 2013 interview
 

More from Tuan Yang

Learn How to Configure Cisco Data Center Core Networking(Handouts).pdf
Learn How to Configure Cisco Data Center Core Networking(Handouts).pdfLearn How to Configure Cisco Data Center Core Networking(Handouts).pdf
Learn How to Configure Cisco Data Center Core Networking(Handouts).pdfTuan Yang
 
Cybersecurity Incident Handling & Response in Under 40 Minutes.pdf
Cybersecurity Incident Handling & Response in Under 40 Minutes.pdfCybersecurity Incident Handling & Response in Under 40 Minutes.pdf
Cybersecurity Incident Handling & Response in Under 40 Minutes.pdfTuan Yang
 
An Introduction to CompTIA Security+ - SY0-601.pdf
An Introduction to CompTIA Security+ - SY0-601.pdfAn Introduction to CompTIA Security+ - SY0-601.pdf
An Introduction to CompTIA Security+ - SY0-601.pdfTuan Yang
 
CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...
CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...
CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...Tuan Yang
 
What is New with CompTIA Network+.pdf
What is New with CompTIA Network+.pdfWhat is New with CompTIA Network+.pdf
What is New with CompTIA Network+.pdfTuan Yang
 
Agile Fundamentals One Step Guide for Agile Projects(Handout).pdf
Agile Fundamentals One Step Guide for Agile Projects(Handout).pdfAgile Fundamentals One Step Guide for Agile Projects(Handout).pdf
Agile Fundamentals One Step Guide for Agile Projects(Handout).pdfTuan Yang
 
Getting Started with AWS Devops.pdf
Getting Started with AWS Devops.pdfGetting Started with AWS Devops.pdf
Getting Started with AWS Devops.pdfTuan Yang
 
Certified Ethical Hacker v11 First Look.pdf
Certified Ethical Hacker v11 First Look.pdfCertified Ethical Hacker v11 First Look.pdf
Certified Ethical Hacker v11 First Look.pdfTuan Yang
 
An overview of agile methods and agile project management
An overview of agile methods and agile project management An overview of agile methods and agile project management
An overview of agile methods and agile project management Tuan Yang
 
The essentials of ccna master the latest principles(handouts)
The essentials of ccna master the latest principles(handouts)The essentials of ccna master the latest principles(handouts)
The essentials of ccna master the latest principles(handouts)Tuan Yang
 
Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)
Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)
Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)Tuan Yang
 
CHFI First Look by NetCom Learning - A Free Course on Digital Forensics
CHFI First Look by NetCom Learning - A Free Course on Digital ForensicsCHFI First Look by NetCom Learning - A Free Course on Digital Forensics
CHFI First Look by NetCom Learning - A Free Course on Digital ForensicsTuan Yang
 
Master Class: Understand the Fundamentals of Architecting on AWS
Master Class: Understand the Fundamentals of Architecting on AWSMaster Class: Understand the Fundamentals of Architecting on AWS
Master Class: Understand the Fundamentals of Architecting on AWSTuan Yang
 
How to Deploy Microsoft 365 Apps and Workloads.
How to Deploy Microsoft 365 Apps and Workloads.How to Deploy Microsoft 365 Apps and Workloads.
How to Deploy Microsoft 365 Apps and Workloads.Tuan Yang
 
Learn to utilize cisco unified communications for better collaboration( hando...
Learn to utilize cisco unified communications for better collaboration( hando...Learn to utilize cisco unified communications for better collaboration( hando...
Learn to utilize cisco unified communications for better collaboration( hando...Tuan Yang
 
NetCom learning webinar how to manage your projects with disciplined agile (d...
NetCom learning webinar how to manage your projects with disciplined agile (d...NetCom learning webinar how to manage your projects with disciplined agile (d...
NetCom learning webinar how to manage your projects with disciplined agile (d...Tuan Yang
 
NetCom learning webinar an introduction to itil®4 create, deliver & suppo...
NetCom learning webinar an introduction to itil®4 create, deliver & suppo...NetCom learning webinar an introduction to itil®4 create, deliver & suppo...
NetCom learning webinar an introduction to itil®4 create, deliver & suppo...Tuan Yang
 
NetCom learning webinar start your network foundations with ccna(handouts)
NetCom learning webinar start your network foundations with ccna(handouts)NetCom learning webinar start your network foundations with ccna(handouts)
NetCom learning webinar start your network foundations with ccna(handouts)Tuan Yang
 
NetCom learning webinar 5 disruptive trends impacting the project management ...
NetCom learning webinar 5 disruptive trends impacting the project management ...NetCom learning webinar 5 disruptive trends impacting the project management ...
NetCom learning webinar 5 disruptive trends impacting the project management ...Tuan Yang
 
Understanding Microsoft Dynamics 365 and the Power Platform in 30 Minutes | N...
Understanding Microsoft Dynamics 365 and the Power Platform in 30 Minutes | N...Understanding Microsoft Dynamics 365 and the Power Platform in 30 Minutes | N...
Understanding Microsoft Dynamics 365 and the Power Platform in 30 Minutes | N...Tuan Yang
 

More from Tuan Yang (20)

Learn How to Configure Cisco Data Center Core Networking(Handouts).pdf
Learn How to Configure Cisco Data Center Core Networking(Handouts).pdfLearn How to Configure Cisco Data Center Core Networking(Handouts).pdf
Learn How to Configure Cisco Data Center Core Networking(Handouts).pdf
 
Cybersecurity Incident Handling & Response in Under 40 Minutes.pdf
Cybersecurity Incident Handling & Response in Under 40 Minutes.pdfCybersecurity Incident Handling & Response in Under 40 Minutes.pdf
Cybersecurity Incident Handling & Response in Under 40 Minutes.pdf
 
An Introduction to CompTIA Security+ - SY0-601.pdf
An Introduction to CompTIA Security+ - SY0-601.pdfAn Introduction to CompTIA Security+ - SY0-601.pdf
An Introduction to CompTIA Security+ - SY0-601.pdf
 
CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...
CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...
CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...
 
What is New with CompTIA Network+.pdf
What is New with CompTIA Network+.pdfWhat is New with CompTIA Network+.pdf
What is New with CompTIA Network+.pdf
 
Agile Fundamentals One Step Guide for Agile Projects(Handout).pdf
Agile Fundamentals One Step Guide for Agile Projects(Handout).pdfAgile Fundamentals One Step Guide for Agile Projects(Handout).pdf
Agile Fundamentals One Step Guide for Agile Projects(Handout).pdf
 
Getting Started with AWS Devops.pdf
Getting Started with AWS Devops.pdfGetting Started with AWS Devops.pdf
Getting Started with AWS Devops.pdf
 
Certified Ethical Hacker v11 First Look.pdf
Certified Ethical Hacker v11 First Look.pdfCertified Ethical Hacker v11 First Look.pdf
Certified Ethical Hacker v11 First Look.pdf
 
An overview of agile methods and agile project management
An overview of agile methods and agile project management An overview of agile methods and agile project management
An overview of agile methods and agile project management
 
The essentials of ccna master the latest principles(handouts)
The essentials of ccna master the latest principles(handouts)The essentials of ccna master the latest principles(handouts)
The essentials of ccna master the latest principles(handouts)
 
Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)
Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)
Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)
 
CHFI First Look by NetCom Learning - A Free Course on Digital Forensics
CHFI First Look by NetCom Learning - A Free Course on Digital ForensicsCHFI First Look by NetCom Learning - A Free Course on Digital Forensics
CHFI First Look by NetCom Learning - A Free Course on Digital Forensics
 
Master Class: Understand the Fundamentals of Architecting on AWS
Master Class: Understand the Fundamentals of Architecting on AWSMaster Class: Understand the Fundamentals of Architecting on AWS
Master Class: Understand the Fundamentals of Architecting on AWS
 
How to Deploy Microsoft 365 Apps and Workloads.
How to Deploy Microsoft 365 Apps and Workloads.How to Deploy Microsoft 365 Apps and Workloads.
How to Deploy Microsoft 365 Apps and Workloads.
 
Learn to utilize cisco unified communications for better collaboration( hando...
Learn to utilize cisco unified communications for better collaboration( hando...Learn to utilize cisco unified communications for better collaboration( hando...
Learn to utilize cisco unified communications for better collaboration( hando...
 
NetCom learning webinar how to manage your projects with disciplined agile (d...
NetCom learning webinar how to manage your projects with disciplined agile (d...NetCom learning webinar how to manage your projects with disciplined agile (d...
NetCom learning webinar how to manage your projects with disciplined agile (d...
 
NetCom learning webinar an introduction to itil®4 create, deliver & suppo...
NetCom learning webinar an introduction to itil®4 create, deliver & suppo...NetCom learning webinar an introduction to itil®4 create, deliver & suppo...
NetCom learning webinar an introduction to itil®4 create, deliver & suppo...
 
NetCom learning webinar start your network foundations with ccna(handouts)
NetCom learning webinar start your network foundations with ccna(handouts)NetCom learning webinar start your network foundations with ccna(handouts)
NetCom learning webinar start your network foundations with ccna(handouts)
 
NetCom learning webinar 5 disruptive trends impacting the project management ...
NetCom learning webinar 5 disruptive trends impacting the project management ...NetCom learning webinar 5 disruptive trends impacting the project management ...
NetCom learning webinar 5 disruptive trends impacting the project management ...
 
Understanding Microsoft Dynamics 365 and the Power Platform in 30 Minutes | N...
Understanding Microsoft Dynamics 365 and the Power Platform in 30 Minutes | N...Understanding Microsoft Dynamics 365 and the Power Platform in 30 Minutes | N...
Understanding Microsoft Dynamics 365 and the Power Platform in 30 Minutes | N...
 

Recently uploaded

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

NetCom Learning: Award-Winning Global Leader in Managed Learning Services

  • 1.
  • 2. ABOUT NETCOM LEARNING NetCom Learning is an award-winning global leader in managed learning services,training and talentdevelopment. Founded Headquarters Delivery Capability : 1998 : New Y orkCity : Worldwide CEO : Russel Sarder 100K+ Professionals trained 14K+ C orporate clients 3500 IT ,Business& Soft Skilscourses 96% Of customers recommend usto others 8.6/9 Instructor evaluations 20+ Leadingvendors recognitions Microsoft’s Worldwide training partner of the year 80% Trained ofthe Fortune 100 T op20 ITTraining Company Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | eccouncil@netcomlearning.com © 1998-2022 NetCom Learning
  • 3. CLICK HERE TO WATCH Access the Recorded Session here! © Interested in training? Contact us! | www.netcomlearning.com | © 1998-2022 NetCom Learning (888) 563-8266 | eccouncil@netcomlearning.com
  • 4. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com | | | AGENDA Overview of Multi-Stage Network Breaches Understanding Forensic Investigation 3 Key Tools and Techniques to Perform Forensic Analysis Q&A with Speaker
  • 5. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com | | | IMPORTANCE OF COMPUTER FORENSICS PROCESS • The investigators must follow a forensic investigation process that comply to local laws and established precedents • As digital evidence is fragile, a proper investigation process that ensures the integrity of evidence is critical to prove a case in court. • The investigators must follow a repeatable and well documented steps
  • 6. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com | | | EVERY CRIME LEAVES A TRAIL OF EVIDENCE!
  • 7. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com | | | MULTI-STAGE ATTACKS ARE MAKING NETWORK DEFENSE DIFFICULT! • Multi-stage attack typically includes an initial dropper file, a main payload component of the malware, and additional modules delivered over a period of days, weeks, or more. • IT managers are inundated with cyberattacks coming from all directions and are struggling to keep up due to a lack of security expertise, budget and up to date technology, according to Sophos. • Cybercriminals use multiple attack methods and payloads for maximum impact • Cybercriminals are evolving their attack methods and often use multiple payloads to maximize profits • Organizations that are only patching externally facing high-risk servers are left vulnerable internally and cybercriminals are taking advantage of this and other security lapses. • Software exploits, unpatched vulnerabilities and/or zero-day threats are top security risk • Lack of security expertise, budget and up to date technology.
  • 8. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com | | | 6 STAGES OF A NETWORK INTRUSION • Reconnaissance • Initial Exploitation • Establish Persistence • Install Tools • Move Literally • Achieve Objective
  • 9. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com | | | COMPUTER FORENSICS • Set of methodological procedures and techniques • Finding evidence related to a digital crime, to find the culprits and initiate legal action against them. Objectives: To gather evidence To track and prosecute cyber criminals. To minimize losses to the organization To protect the organization from similar incidents in future Intent of perpetrator Cybercrime- Any illegal act that involving a computer device, network or application Internal- Breach of Trust by disgruntled employees External- Attackers • Company becomes target of intrusions every 15 minutes from external source
  • 10. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com | | | TYPES OF FORENSICS • Network forensics • Email forensics • Malware forensics • Memory forensics • Cell Phone forensics • Database forensics • Disk forensics
  • 11. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com | | | CYBER CRIME INVESTIGATION • Collection of clues and forensic evidence • There will be at least one electronic device found during the investigation. • The electronic device found may be central to the investigation, as it could contain valuable evidence for solving the case. • Therefore, the information contained in this device must be investigated in the proper manner • Process such as collection, process and analysis of data differ based on the type of the case • Types • Civil • Criminal • Administrative
  • 12. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com | | | RULES OF FORENSIC INVESTIGATION • Limited access and examination of the original evidence • Record changes made to evidence files • Create chain of custody • Comply with standards • Hire professionals for analysis • Evidence should be strictly related to incident • Securely store evidence • Use recognized tools for analysis
  • 13. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com | | | DIGITAL EVIDENCE Digital Evidence: Any information of probative value that is either stored or transmitted in a digital form. Locard’s Exchange Principle- “Anyone entering a crime scene takes something of the scene with them, and leaves something of themselves behind when they leave” Type Volatile Non-Volatile
  • 14. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com SOURCES OF POTENTIAL EVIDENCE • Hard Drive, Thumb Drive, Memory card • Smart card, Biometric Scanner, Digital Camera • Routers, Hubs, Switches • Removable storage device • Scanners, Fax Machines, GPS
  • 15. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com FORENSIC READINESS Organization’s ability to make optimal use of digital evidence in a limited period of time and with minimal investigation costs Benefits Fast and efficient investigation Structured storage of evidence- reduces expense and time of investigation Easy identification of evidence Gives attackers less time to cover tracks
  • 16. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com ROLES AND RESPONSIBILITIES OF FORENSIC INVESTIGATOR • Determine extent of damage • Recovers data of investigate value • Gathers evidence in a forensically manner • Ensures that evidence is not damaged • Creates an image of original evidence without tampering to maintain integrity • Guides officials in carrying out investigation • Reconstructs the damaged disks or other storage devices, and uncover the information hidden on the computer • Analyzes evidence data found • Prepares analysis report • Updated organizations about various attacks and recovery techniques. • Address issue in court
  • 17. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com WHAT MAKES A GOOD COMPUTER FORENSIC INVESTIGATOR? • Interviewing skills to gather much information about case • Researching skills to know the background activities • Patience and willingness to work long hours • Excellent writing skills to detail findings in the report • Strong analytical skills to find evidence and link it to suspect • Excellent communication skills to explain findings • Be updated with new methods and forensic technology • Well versed in more than one computer platform • Knowledge of various technologies, hardware, software. • Honest, ethical and law abiding
  • 18. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com PHASES IN THE COMPUTER FORENSICS INVESTIGATION PROCESS Pre- investigation Phase Investigation Phase Post- investigation Phase
  • 19. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com COMPUTER FORENSIC INVESTIGATION METHODOLOGY 1. First Response 2. Search and Seizure 3. Collect evidence 4. Secure evidence 5. Data acquisition 6. Data analysis 7. Evidence assessment 8. Documentation & Reporting 9. Testing as an expert witness
  • 20. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com 3 KEY TECHNIQUES TO PERFORM FORENSIC ANALYSIS • Preparation/Extraction • whether there is enough information to proceed, validation of all hardware and software, duplicates the forensic data provided in the request and verifies its integrity, If examiners get original evidence, they need to make a working copy and guard the original's chain of custody, tool selection • Identification • Examiners repeat the process of identification for each item on the Extracted Data List, check if its out of scope • Analysis • In the analysis phase, examiners connect all the dots and paint a complete picture for the requester, examiners answer questions like who, what, when, where, and how.
  • 21. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com 3 KEY TECHNIQUES TO PERFORM FORENSIC ANALYSIS • Autopsy/the Sleuth Kit • The Sleuth Kit is a command-line tool that performs forensic analysis of forensic images of hard drives and smartphones. Autopsy is a GUI-based system that uses The Sleuth Kit behind the scenes. • EnCase • Encase is an application that helps you to recover evidence from hard drives. It allows you to conduct an in-depth analysis of files to collect proof like documents, pictures, etc. • FTK Imager • FTK Imager is a data preview and imaging tool used to acquire data (evidence) in a forensically sound manner by creating copies of data without making changes to the original evidence
  • 22. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 eccouncil@netcomlearning.com RELEVANT CERTIFICATION - CHFI https://www.eccouncil.org/programs/computer-hacking-forensic-investigator-chfi/
  • 23. Recommended Courses NetCom Learning offers a comprehensive portfolio for Security » EC-COUNCIL CHFI: COMPUTER HACKING FORENSIC INVESTIGATOR V10 – Class Scheduled on Oct 17 » EC-COUNCIL CND: CERTIFIED NETWORK DEFENDER V2 - Class Scheduled on Oct 24 » EC-COUNCIL CEH: CERTIFIED ETHICAL HACKER V12 - Class Scheduled on Oct 17 You can also access the below Marketing Assets » Free 1hr Training - Best Practices to Cybersecurity Vulnerability Assessment and Solutions Implementation » Free On-Demand Training - Learn Cybersecurity Incident Handling & Response in Under 40 Minutes » Blog - Top 5 Popular Cybersecurity Certifications for 2022 Interested in training? Contact us! | www.netcomlearning.com | © 1998-2022 NetCom Learning (888) 563-8266 | eccouncil@netcomlearning.com
  • 24. Other Marketing Assets COURSES & CERTIFICATIONS Interested in training? Contact us! | www.netcomlearning.com | © 1998-2022 NetCom Learning OUR FREE VIRTUAL EVENTS BLOGS SAVINGS PROGRAMS & PROMOS (888) 563-8266 | eccouncil@netcomlearning.com
  • 25. Stay Digital Safe - Assess and Upskill your team against cyber threats now ! NetCom Learning's end-user Cybersecurity Awareness Training & Phishing Simulation Solution offers phishing simulations on email, voice, and text to organizations, and is bundled with 90+ interactive security awareness video courses for the end-users. Request a Demo Interested in training? Contact us! | www.netcomlearning.com | © 1998-2022 NetCom Learning (888) 563-8266 | eccouncil@netcomlearning.com
  • 26. Learning Passport Flexible Team Training Package Specifically designed to be customized for the number of learners you plan to train on top-notch technology providers – including Microsoft, AWS, Cisco, CompTIA, Adobe, Autodesk, PMI, EC-Council, and more. Redeemable over 4,000+ official courses Flexible fund validity of 12 months Contact Us Now To Schedule your appointment with our learning consultants. Toll-free Phone: 1-888-563-8266 | Email: info@netcomlearning.com Learn More Interested in training? Contact us! | www.netcomlearning.com | © 1998-2022 NetCom Learning (888) 563-8266 | eccouncil@netcomlearning.com
  • 27. NetCom Individual Learner Subscription Get 24/7 access to unlimited virtual instructor-led and self-paced IT and business training for 12 months. NetCom+ includes over 250 e-Learning and 140 virtual instructor led courses across various domains. $2,999 per learner per year * Additional discounts available for enterprises + Learn More Interested in training? Contact us! | www.netcomlearning.com | © 1998-2022 NetCom Learning (888) 563-8266 | eccouncil@netcomlearning.com
  • 28. Exclusive Government Savings Solutions For FY22 This fiscal year, take full advantage of your FY22 training budget and strengthen your workforce's skillset across 9 domains such as Cloud, Security, Networking, Project Management, and more, delivered by certified instructors - equipped with security clearance and government and military training experience. Learning Passport Experience up to a 100% increase in purchasing power and secure your yearly training Get Special Pricing Get exclusive Special Pricing for Government and Military on courses up to $3,600 NetCom+ Subscription Save training dollars and get unlimited access to virtual Instructor-led and on-demand courses Help teams earn and maintain certifications as per Department of Defense (DoD) directive 8140 (Formerly known as DoD 8570) Interested in training? Contact us! | www.netcomlearning.com | © 1998-2022 NetCom Learning (888) 563-8266 | eccouncil@netcomlearning.com
  • 29. NetCom Learning serves all Government agencies through our GSA schedule, 47QTCA22D004B. Our GSA Schedule provides more than 800 classroom training solutions available for delivery at one of our many training facilities, at your location or at an off-site that offers maximum convenience. NetCom Learning is also approved as GSA Small Business for GSA Set Asides. We accept GSA SmartPay and GCPC credit cards | We participate in GSA Advantage Interested in training? Contact us! | www.netcomlearning.com | © 1998-2022 NetCom Learning (888) 563-8266 | eccouncil@netcomlearning.com
  • 30. Continue your Cybersecurity Skilling Journey with Microsoft Security Fundamentals You will get access to your free Microsoft Official Courseware on SC-900T00: Microsoft Security, Compliance, And Identity Fundamentals in the NetCom365 Learning Portal. Access Now Interested in training? Contact us! | www.netcomlearning.com | © 1998-2022 NetCom Learning (888) 563-8266 | eccouncil@netcomlearning.com
  • 31. FOLLOW US ON LinkedIn T witter YouTube Instagram Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | eccouncil@netcomlearning.com © 1998-2022 NetCom Learning
  • 32. A BOOK FROM RUSSELL SARDER CEO - NETCOM LEARNING A framework to build a smarter workforce, adapt to change and drive growth. Download Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | eccouncil@netcomlearning.com © 1998-2022 NetCom Learning
  • 33. Thankyou Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | eccouncil@netcomlearning.com © 1998-2022 NetCom Learning