Loading Events

Hacking Investigations: Preserving and Analyzing evidence of Intrusions

As Intrusions become more common, it is becoming a bigger problem for Law Enforcement and security experts to respond to the incidents. This webinar will cover the proper steps to preserve evidence in Intrusion Investigations.

 

Identifying the Intrusion

            What’s the difference between an Intrusion, a Ransomware and a virus?

            How to determine what is user error vs a targeted attack

 

Where is the evidence

            Firewalls

            Event Logs

            Router Logs

 

How can we preserve all of the evidence?

 

Analyzing the evidence collected

 

 

 

During the webinar, instruction will be given on how to download a copy of the instructor’s PowerPoint as well as additional resource materials pertaining to the topic.

 

REGISTER NOW