Hacking Investigations: Preserving and Analyzing evidence of Intrusions
As Intrusions become more common, it is becoming a bigger problem for Law Enforcement and security experts to respond to the incidents. This webinar will cover the proper steps to preserve evidence in Intrusion Investigations.
Identifying the Intrusion
What’s the difference between an Intrusion, a Ransomware and a virus?
How to determine what is user error vs a targeted attack
Where is the evidence
Firewalls
Event Logs
Router Logs
How can we preserve all of the evidence?
Analyzing the evidence collected
During the webinar, instruction will be given on how to download a copy of the instructor’s PowerPoint as well as additional resource materials pertaining to the topic.