Identify, Respond and Recover from a Security Breach.
This comprehensive, technically detailed course enables you to successfully respond to incidents and reinforce your security posture.
3. Legal Concerns
4. UNIX & Linux Incident Response
5. Windows Incident Response
6. File Carving and Toolkit Building
7. Network-Based Monitoring
8. File System Forensics
9. Advanced Topics