Community: Webcasts


Mobile Device Forensics

Mobile device forensics is a rapidly evolving field, creating exciting opportunities for practitioners in corporate, criminal, and military settings. This presentation provides an overview of useful data that can be extracted from mobile devices and how this information can be useful in a variety of situations. Professionals within organizations can find stolen data and incriminating communications on devices used by rogue employees. In civil and criminal cases, digital forensic investigators can extract useful evidence from mobile devices, can get a clearer sense of which individuals were in cahoots, and can even show the location of key suspects at times of interest. IT auditors, managers, and lawyers all need to understand the vast potential of mobile device forensics. Because mobile devices can contain details about who was doing what, where and when, their usefulness as a source of information in an investigation should never be underestimated. Go to Webcast

Introduction to Malware Analysis Webcast:

Lenny Zeltser's popular malware analysis course has helped IT administrators, security professionals, and malware specialists fight malicious code in their organizations. In this free webcast, Lenny introduce the process of reverse-engineering malicious software. Lenny covers behavioral and code analysis phases, to make this topic accessible even to individuals with a limited exposure to programming concepts. You'll learn the fundamentals and associated tools to get started with malware analysis. Learn More

IT'S ALIVE!!! Investigating with Network-based Evidence

Bypassing Locked Smartphones - Are you really locked out?

Dumping in the Dark: Gaining Insight into your Memory Acquisition Tools and Techniques

Finding Unknown Malware

Geolocation Forensics

What's New in REMnux v4 for Malware Analysis?

Analysis and Correlation of Macintosh Logs

Malware Analysis Essentials using REMnux

Incident Response and Forensics In The Cloud

How memory forensics will help you lose weight and look ten years younger

Leveraging Cyber Threat Intelligence

Knock-off Phone Forensics -Some handsets Aren't What They Appear To Be

You can panic now. Host Protection is (mostly) dead - An Incident Response and Forensics Analysis of an APT attack

Detecting Persistence Mechanisms

Ask The Expert Webcast: Not So Private Browsing

Memory Forensics for Incident Response

Network Forensics - What Are Your Investigations Missing?

Finding Unknown Malware

Protecting Privileged Domain Accounts during Live Response

Introduction to Malware Analysis: Turn Malware Inside Out!

Malware Analysis Essentials using REMnux with Lenny Zeltser

DFIR Techniques using the SIFT Workstation

IR & Computer Forensics In The Virtual Realm

Windows 8 Forensics: FileHistory Service

SANS Webcast Introduction to Windows Memory Analysis

HTCIA and COINS are pleased to present "Super Timeline Analysis"

Network Forensics - A Critical Component in Digital Forensic Investigations