Incident Response: Evidence Collection in Windows
Offered By: LinkedIn Learning
Course Description
Overview
Learn how to perform evidence collection—a vital step in incident response. Find out how to collect volatile and non-volatile data and build an evidence report.
Syllabus
Introduction
- You've been hacked
- What you need to know before taking this course
- Conducting an incident response
- Preparation in the key to success
- Storage devices in Windows
- Installing FTK Imager
- Installing DD for Windows
- Preparing your evidence collection drive
- Creating a USB drive with trusted tools
- Validating our trusted tool kit
- Evidence collection
- Volatile and nonvolatile data
- Acquiring a memory image in Windows
- Acquiring a memory image in Windows in DumpIt
- Using CryptCat and Tee
- Collecting the data/time of the victim
- Documenting the logged on users
- Documenting open network connections
- Documenting the running processes
- Documenting any shared files
- Nonvolatile evidence collection
- Collecting disk attributes using Disk Map
- Documenting completion of live collection
- Verification of data collected
- Graceful shutdown
- Write blockers
- Enabling a software write blocker in Windows
- Imaging a drive with the FTK Imager
- Imaging a drive with Forensic Imager
- Encryption in Windows
- Determining if BitLocker is running
- Securing a system with BitLocker
- BitLocker implementation and recovery password
- Creating a report
- Example report
- Next steps
Taught by
Jason Dion
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network