Mobile device forensics is a rapidly evolving field, creating exciting opportunities for practitioners in corporate, criminal, and military settings. This presentation provides an overview of useful data that can be extracted from mobile devices and how this information can be useful in a variety of situations. Professionals within organizations can find stolen data and incriminating communications on devices used by rogue employees. In civil and criminal cases, digital forensic investigators can extract useful evidence from mobile devices, can get a clearer sense of which individuals were in cahoots, and can even show the location of key suspects at times of interest. IT auditors, managers, and lawyers all need to understand the vast potential of mobile device forensics. Because mobile devices can contain details about who was doing what, where and when, their usefulness as a source of information in an investigation should never be underestimated. Go to Webcast
Lenny Zeltser's popular malware analysis course has helped IT administrators, security professionals, and malware specialists fight malicious code in their organizations. In this free webcast, Lenny introduce the process of reverse-engineering malicious software. Lenny covers behavioral and code analysis phases, to make this topic accessible even to individuals with a limited exposure to programming concepts. You'll learn the fundamentals and associated tools to get started with malware analysis. Learn More
IT'S ALIVE!!! Investigating with Network-based Evidence
Bypassing Locked Smartphones - Are you really locked out?
Dumping in the Dark: Gaining Insight into your Memory Acquisition Tools and Techniques
Finding Unknown Malware
What's New in REMnux v4 for Malware Analysis?
Analysis and Correlation of Macintosh Logs
Malware Analysis Essentials using REMnux
Incident Response and Forensics In The Cloud
How memory forensics will help you lose weight and look ten years younger
Leveraging Cyber Threat Intelligence
Knock-off Phone Forensics -Some handsets Aren't What They Appear To Be
You can panic now. Host Protection is (mostly) dead - An Incident Response and Forensics Analysis of an APT attack
Detecting Persistence Mechanisms
Ask The Expert Webcast: Not So Private Browsing
Memory Forensics for Incident Response
Network Forensics - What Are Your Investigations Missing?
Finding Unknown Malware
Protecting Privileged Domain Accounts during Live Response
Introduction to Malware Analysis: Turn Malware Inside Out!
Malware Analysis Essentials using REMnux with Lenny Zeltser
DFIR Techniques using the SIFT Workstation
IR & Computer Forensics In The Virtual Realm
Windows 8 Forensics: FileHistory Service
SANS Webcast Introduction to Windows Memory Analysis
HTCIA and COINS are pleased to present "Super Timeline Analysis"
Network Forensics - A Critical Component in Digital Forensic Investigations