Community: Webcasts

Community:

Mobile Device Forensics

Mobile device forensics is a rapidly evolving field, creating exciting opportunities for practitioners in corporate, criminal, and military settings. This presentation provides an overview of useful data that can be extracted from mobile devices and how this information can be useful in a variety of situations. Professionals within organizations can find stolen data and incriminating communications on devices used by rogue employees. In civil and criminal cases, digital forensic investigators can extract useful evidence from mobile devices, can get a clearer sense of which individuals were in cahoots, and can even show the location of key suspects at times of interest. IT auditors, managers, and lawyers all need to understand the vast potential of mobile device forensics. Because mobile devices can contain details about who was doing what, where and when, their usefulness as a source of information in an investigation should never be underestimated. Go to Webcast


Introduction to Malware Analysis Webcast:

Lenny Zeltser's popular malware analysis course has helped IT administrators, security professionals, and malware specialists fight malicious code in their organizations. In this free webcast, Lenny introduce the process of reverse-engineering malicious software. Lenny covers behavioral and code analysis phases, to make this topic accessible even to individuals with a limited exposure to programming concepts. You'll learn the fundamentals and associated tools to get started with malware analysis. Learn More


IT'S ALIVE!!! Investigating with Network-based Evidence
https://www.sans.org/webcasts/for572-network-forensics-preview-alive-investigating-network-based-evidence-97200

Bypassing Locked Smartphones - Are you really locked out?
https://www.sans.org/webcasts/for585-advanced-smartphone-mobile-device-forensics-preview-bypassing-locked-smartphones-97185

Dumping in the Dark: Gaining Insight into your Memory Acquisition Tools and Techniques
https://www.sans.org/webcasts/dumping-dark-gaining-insight-memory-acquisition-tools-techniques-97260

Finding Unknown Malware
https://www.sans.org/webcasts/finding-unknown-malware-97077

Geolocation Forensics
https://www.sans.org/webcasts/geolocation-forensics-97082

What's New in REMnux v4 for Malware Analysis?
https://www.sans.org/webcasts/remnux-v4-malware-analysis-96585

Analysis and Correlation of Macintosh Logs
https://www.sans.org/webcasts/analysis-correlation-macintosh-logs-95905

Malware Analysis Essentials using REMnux
https://www.sans.org/webcasts/malware-analysis-essentials-remnux-96397

Incident Response and Forensics In The Cloud
https://www.sans.org/webcasts/incident-response-forensics-cloud-96260

How memory forensics will help you lose weight and look ten years younger
https://www.sans.org/webcasts/memory-forensics-lose-weight-ten-years-younger-96237

Leveraging Cyber Threat Intelligence
https://www.sans.org/webcasts/leveraging-cyber-threat-intelligence-96262

Knock-off Phone Forensics -Some handsets Aren't What They Appear To Be
https://www.sans.org/webcasts/knock-off-phone-forensics-some-handsets-96232

You can panic now. Host Protection is (mostly) dead - An Incident Response and Forensics Analysis of an APT attack
https://www.sans.org/webcasts/panic-now-host-protection-mostly-dead-incident-response-forensics-analysis-o-96177

Detecting Persistence Mechanisms
https://www.sans.org/webcasts/detecting-persistence-mechanisms-96090

Ask The Expert Webcast: Not So Private Browsing
https://www.sans.org/webcasts/private-browsing-95520

Memory Forensics for Incident Response
https://www.sans.org/webcasts/memory-forensics-incident-response-95647

Network Forensics - What Are Your Investigations Missing?
https://www.sans.org/webcasts/network-forensics-investigations-missing-95619

Finding Unknown Malware
https://www.sans.org/webcasts/finding-unknown-malware-95614

Protecting Privileged Domain Accounts during Live Response
https://www.sans.org/webcasts/protecting-privileged-domain-accounts-live-response-95589

Introduction to Malware Analysis: Turn Malware Inside Out!
https://www.sans.org/webcasts/introduction-malware-analysis-turn-malware-out-95490

Malware Analysis Essentials using REMnux with Lenny Zeltser
https://www.sans.org/webcasts/forensics-prague-webcast-malware-analysis-essentials-remnux-lenny-zeltser-95379

DFIR Techniques using the SIFT Workstation
https://www.sans.org/webcasts/dfir-techniques-sift-workstation-95370

IR & Computer Forensics In The Virtual Realm
https://www.sans.org/webcasts/ir-computer-forensics-virtual-realm-95360

Windows 8 Forensics: FileHistory Service
https://www.sans.org/webcasts/windows-8-forensics-filehistory-service-95325

SANS Webcast Introduction to Windows Memory Analysis
https://www.sans.org/webcasts/webcast-introduction-windows-memory-analysis-95109

HTCIA and COINS are pleased to present "Super Timeline Analysis"
https://www.sans.org/webcasts/htcia-coins-pleased-present-super-timeline-analysis-94739

Network Forensics - A Critical Component in Digital Forensic Investigations
https://www.sans.org/webcasts/network-forensics-critical-component-digital-forensic-investigations-94729