Community: Webcasts

Community:
Hands on USN Journal Analysis

David Cowen
https://www.sans.org/webcasts/hands-on-usn-journal-analysis-99177


Closing the Door on Web Shells

Anuj Soni
https://www.sans.org/webcasts/closing-door-web-shells-99127


DFIR Advanced Smartphone Forensics

Cindy Murphy
https://www.sans.org/webcasts/dfir-advanced-smartphone-forensics-98415


When Macs get Hacked

Sarah Edwards
https://www.sans.org/webcasts/macs-hacked-98035


IT'S ALIVE!!! Investigating with Network-based Evidence

Phil Hagen
https://www.sans.org/webcasts/for572-network-forensics-preview-alive-investigating-network-based-evidence-97200


FOR585 Advanced Smartphone and Mobile Device Forensics Preview: Android vs. iOS - Battle of the Smartphones: Data Retention

Heather Mahalik
https://www.sans.org/webcasts/for585-advanced-smartphone-mobile-device-forensics-preview-android-vs-ios-battle-sma-97205


10 Ways To Rock Your SOC

Shelly Giesbrecht
https://www.sans.org/webcasts/10-ways-rock-soc-97975


Detecting Evil on Windows Systems - An In-Depth Look at the DFIR Poster

Mike Pilkington and Rob Lee
https://www.sans.org/webcasts/detecting-evil-windows-systems-in-depth-dfir-poster-98030


Practical Threat Management and Incident Response for the Small- to Medium-Sized Enterprise

Jake Williams and Patrick Bedwell
https://www.sans.org/webcasts/practical-threat-management-incident-response-sme-98260


Logs, Logs, Every Where / Nor Any Byte to Grok

Phil Hagen
https://www.sans.org/webcasts/logs-logs-byte-grok-97985


Bypassing Locked Smartphones - Are you really locked out?

Heather Mahalik
https://www.sans.org/webcasts/for585-advanced-smartphone-mobile-device-forensics-preview-bypassing-locked-smartphones-97185


Malware Analysis Essentials Using REMnux

Lenny Zeltser
https://www.sans.org/webcasts/malware-analysis-essentials-remnux-w-lenny-zeltser-98045


Dumping in the Dark: Gaining Insight into your Memory Acquisition Tools and Techniques

Alissa Torres
https://www.sans.org/webcasts/dumping-dark-gaining-insight-memory-acquisition-tools-techniques-97260


Finding Unknown Malware

Hal Pomeranz
https://www.sans.org/webcasts/finding-unknown-malware-97077


How Defense-In-Depth Helps Protect You From Unexpected Vulnerabilities Like Heartbleed

Jake Williams, SANS & Adam Goodman
https://www.sans.org/webcasts/defense-in-depth-helps-protect-unexpected-vulnerabilities-heartbleed-98155


Geolocation Forensics

Chad Tilbury
https://www.sans.org/webcasts/geolocation-forensics-97082


Mobile Malware and Spyware - Working Through the Bugs

Cindy Murphy
https://www.sans.org/webcasts/mobile-malware-spyware-working-bugs-97790