Computer Forensics, Cyber Crime & Incident Response: A Comprehensive Guide - dmj.one

INTRODUCTION TO COMPUTER FORENSICS

INTRODUCTION TO COMPUTER FORENSICS

Introduction to Traditional Computer Crime, traditional problems associated with Computer Crime. Introduction to Identity Theft & Identity Fraud. Types of CF techniques – Incident and incident response methodology – Forensic duplication and investigation. Preparation for IR: Creating response tool kit and IR team. – Forensics Technology and Systems – Understanding Computer Investigation – Data Acquisition.

Computer Forensics

Computer Security Incident

What is Computer Forensics?

Computer Forensics Vs Other Disciplines

Digital Evidence

Case Study

Who Uses Computer Forensics?

Cyber Crime

History of Cyber Crime

Cyber Crime & Its Categories

Cyber Crime Variants

Introduction to Identity Theft & Fraud

Reduce the Risk (Identity Theft)

Reduce the Risk (Additional Measures)

What to Do if Someone Has Stolen Your Identity

Types of Cyber Forensics

Military Computer Forensic Technology

Law Enforcement Computer Forensic

Business Computer Forensic

Forensics Services Available

Incident Response

Rationale for Incident Response

Incident Response Architecture

Incident Response Risk Analysis

Incident Response Risk Analysis (Continued)

Incident Response Methodology

Incident Response Methodology – Detection and Containment

Incident Response Methodology – Eradication in UNIX Systems

Incident Response Methodology – Eradication in UNIX Systems (Continued)

Incident Response Methodology – Eradication in Windows Systems

Incident Response Methodology – Eradication in Windows 2000

Incident Response Methodology – Recovery

Incident Response Methodology – Follow-Up

Summary of Incident Response Methodology

Incident Response – Forming and Managing an IR Team

Incident Response – Why an Incident Team?

Incident Response – Basic Requirements

Incident Response – Determining/Dealing with Constituency

Incident Response – Success Metrics

Incident Response – Organization of the IR Team

Incident Response – External Coordination

Incident Response – Role of Computer Forensics

Incident Handling Lifecycle