Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
In this video we examine the seven steps of evidence collection:
- Identification - identify something a evidence from what's left behind such as fingerprints and DNA as well as what was taken.
- Preservation - the chain of custody must be documented and provide a history of how the evidence was handled since digital evidence can be easily manipulated. Hashing is used to verify that data remains unchanged.
- Collection - it's important to limit evidence handling. Document using photos and taking an image of the system. We must always work fast since some data is volatile. It's also important to do things legally and respect the Fourth Amendment.
- Examination - just the facts!
- Analysis - look for meaning in the data in order to find the "what" of the investigation.
- Decision - the final verdict from trial.
Part 1 - Intro
Part 2 - Determining Data Sensitivity
Part 3 - Who is Responsible for Security in Cloud Models
Part 4 - SDLC in the Cloud
Part 5 - OWASP 1 through 5
Part 6 - OWASP 6 through 10
Part 7 - Defensive Coding
Part 8 - Risks and Controls
Part 9 - Crypto in the Cloud
Part 10 - Common Architectures
Part 11 - Identity and Access Management
Part 12 - Data and Media Sanitization
Part 13 - Intro to ID
Part 14 - Defining Identity and Access Management
Part 15 - Virtualization Overview
Part 16 - Threat Modeling
Part 17 - Threats to Cloud Computing
Part 18 - Types of Testing
Part 19 - BCP
Part 20 - Non Functional Testing
Part 21 - Vulnerability Scans and Penetration Testing
Part 22 - Review