Incident Response and Forensics Part 1

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

4 hours 21 minutes
Video Transcription
All right, let's go ahead and start s o. The goals today are really don't understand. Like, what is a stock analyst last forensic investigators slash incident responders do. And again, I mentioned we're gonna be tying all that up into one sort of theme.
We're also gonna learn about the job market's. So, you know, are there actually job opportunities out there? What are some of the benefits, like the pay that a stock analyst or similar could expect? And then also, we're gonna cover some of the tools that you might use now for the tools. We're gonna focus more on the forensic side, so I'll show you
a tool that we can use to pick up now where we will not be reversing Mallory here.
I just want to stress that. And then also, we'll take a look at some other tools that we can use for forensics to analyze a couple of photos later on. So again, much of that is more in the incident response forensic side, but and all the relevant based on your particular position as a stock analyst,
you need a computer which most people should have if they're able to watch this. If you're if you got some cool set up. What, you don't You're not using a computer or a cell phone. We would love to hear about it. You know, if you're using, like, smoke signals from a fire, I make this happen. Uh, that's super cool. And we want to learn how you do that. Also coming with a willingness to learn and also committing to learning the material
most and most importantly, on this list.
Smart, right. Have a good time. We're here to enjoy our sales. You'll hear Joined. I banter back and forth if you haven't watched any of the other episodes s O. We just want to have an enjoyable experience and learned a little bit About what a stock analyst
that's really important. A lot of a lot of learning in the IRA security. A lot of sort of video courses like this could be very, very dry, very, very kind of tough to get through just because
just communicating information isn't really the same thing, is actually communicating. So that's kind of why we have this format. Setup is we do. You may have noticed with both ways on this stream That's very new setup for Cyberia. Something we're kind of testing out.
So please do let us know. You know, in the comments in your feedback, let us know if you like this format, let us know if you're interested in this sort of style of video. Or if you prefer the dusty dry, Just a power points one way or the other. Just let us know.
Yes, definitely. If you love death by power point, let us know. Curious to find out why. Yeah. Yeah. As you mentioned a lot of a lot of training material out there that we've dealt with as we kind of came up in the industry, spent extremely dry and boring and put us to sleep many times. I slept through courses. I was like, Oh, yeah. Oh, I finished. No, I should go back and look at it. So you know what?
I should find out what I just learned. Yeah, Yeah, yeah.
Anyways, we're digressing there. I just want to thank s Oh, Joe through this photo of John Travolta and they're from a pulp fiction if I remember.
And there would you know, everyone is liking so far that we have that in there. So if you like that, let us know in the chat. If you hate it, let us know as well. So we make sure we tailor the photos to your preference
s. So are you in the right place? You know? So are you new to the field of I t So you're kind of looking like Okay, what kind of career past should I get into? Are you knew her to? You know, do you maybe have experience in I T. But you're like, OK, I want to jump into the cyber security field. And what can I do here? And you just want to learn about, Like, what? A stock analyst for forensics person does,
you know, or do you have an interest? You know, let's say you're working. You know, it's a security engineering something. And you're like, You know what I really want
get into forensics, you know? So all that you know all those. If you're one of those people, then you're in the right spot.
You just want to have a better understanding of the role of a stock analyst or incident responders. Forensic investigator. If yes, you're in the right spot if you're one of the following. So we talking many of these episodes about record, so if you're a recruiter, you're in the right spot. If you're trying to find out how you can create the best job posting, do not frustrate the best game.
Then you're in the correct location. Same with the hiring manager. If you're trying to create that job description and send it to a recruiter
and you're trying to figure stuff out so you don't frustrate the best candidate again,
you're in the right spot.
And then also people that are, you know, looking for a job. You know, Stock analyst is a good entry level type of role, and again, there's different levels of stock analyst that you could move through in your career. And also, if your students, if your university right now and you're getting exposed to all these different fields of cyber security, you're like I have no clue what I want to start off with. How do I get a job after graduation?
Then? This is a good career path that you might take two,
get a job right after graduation and move forward in your career
and most importantly, if you like free stuff because a little later on Joe's gonna mention some super secret information that we mentioned on the last section as well. And stay tuned, because that way you'll know what we're talking about.
So we're not gonna give you a hint in advance.
All right? So something better material. So I'm gonna be using a Cali Lennox are virtual machine is well, it's a Windows 10 virtual machine today just for the lab. So again, often optional stuff. If you want to use that
on, then these slides, right, We're going through the slide. So that's good information.
v ems or anything like that. And you can find a ton of courses on cyber that will walk you through this.
So, stock analysts, what do you actually do? Well, one of the main things you're actually monitoring systems, right? So from different
tools were getting all that information kind of aggregated. And then it's, you know, essentially spit out to us as a stock analyst and we could analyze it and then from there, determine if there's any actual security incident or threat going on, especially on critical systems. And if so, then You know, we either would
movinto like it's in a response, or we would kick it to the Incident Response Team
not to move forward from there. Aside mentioned analyzing logs, reports, etcetera. So basically, we're getting all that data in and then making sense of it and then pushing it out in things like reports or, you know, just you know, like Joe and I were sitting next to each other, we may have a conversation like a man. This doesn't look right. Let's take a look at this and let's take a little closer look.
As I mentioned, all a part of that is, you know,
we get the information in, we determine there's some incident going on. Then we would perform incident response. We're gonna triage yet right, because there might be an incident. But maybe it's not information or a system that's not critical to the business. You know, Let's say they're just trying to get, you know, Joe's, you know, MP three, stash of Taylor Swift songs, right? So
that's not really a high priority for the company, But for Joe, it is, you know, but yes, so just keeping that in mind as well So that's all part of that triage process of incident response where we figure out if it's actually affecting critical systems.
And then from that point, we kind of go into the more the investigating the security threats and breaches, you know, as far as jumping into, like, forensics and figure it out like Okay, what did the bad people really do? How they get in, what kind of mount where did they use? You know, they put rockets on our systems, and then from there we could potentially create better
processes to prevent against that stuff for at least mitigated in the future.
Up Next
Introduction to IT & Cybersecurity

In this FREE IT and cybersecurity training for beginners, you will learn about the four primary disciplines of information technology (IT) and cybersecurity. This introduction to IT course is designed to help you decide which career path is right for you.

Instructed By