Главная
Study mode:
on
1
Introduction
2
Why this topic
3
Threat Intelligence
4
Types of forensics
5
Threat hunting
6
Digital forensics vs threat hunting
7
Log everything
8
Soft skills
9
Memory analysis
10
SysInternals
11
Prefetch
12
shimcache
13
Baseline
14
Network forensics
15
Pcaps
16
Memory Capture
17
Packet Analysis
18
Threat Intelligence Feed
19
Virus Total
20
Linux VM
21
MRI
22
Sift
23
Closing
Description:
Explore proactive incident response strategies in this conference talk from NolaCon 2018. Delve into threat intelligence, various forensics types, and threat hunting techniques. Learn the differences between digital forensics and threat hunting, and discover the importance of comprehensive logging. Develop essential soft skills for effective incident response. Gain insights into memory analysis, SysInternals tools, Prefetch, and Shimcache. Establish baseline practices, explore network forensics, and master packet analysis. Understand the value of threat intelligence feeds, VirusTotal, and Linux tools like SIFT. Enhance your blue team capabilities with practical steps to supercharge your incident response processes.

Dear Blue Team - Proactive Steps to Supercharge Your IR

Add to list