The countdown is ON! Just a few more days until we meet Live Online for the most comprehensive DFIR event of the year! With more than 17k people register so far to attend the summit, we understand that many of you might not be aware of the amount of free DFIR resources available.
We are proud to offer the community over 150 free tools and countless cheat-sheets, posters, webcasts, and blog posts produced by our faculty and we understand it could be difficult to decide which ones you should “deep-dive” into first. So, we have put together a compilation of the most popular new content by category to make it easier for you.
Getting Started in DFIR
|Kevin Ripa’s 3MinMax: Episode 74: How to Get Started in Digital Forensics|
There are many misconceptions and it is not easy to start in the field, but then if it was easy, everyone would be doing it, right? FOR498: Battlefield Forensics & Data Acquisition course author Kevin Ripa tells you how to get started in the field in 3 minutes or less.
|SANS@MIC: Getting Started in Digital Forensics|
SANS Technology Institute | Graduate Certificate in Incident Response
Discover the graduate certificate program in Incident Response from the SANS Technology Institute.
- Earn 4 GIAC certifications as you progress this highly technical 13-credit-hour program.
- A 100% online option is available. SANS.edu programs are accredited and eligible for most corporate tuition plans.
- Eligible for U.S. VA Education Benefits. Applications are accepted monthly.
Join a free online info session on Wed, July 29, at 1 pm (EDT) to learn about all SANS.edu graduate programs.
Incident Response and Threat Hunting
|3 Key Lessons CTI Teams Should Learn From|
Cyber Threat Intelligence Summit 2020
This presentation identifies areas where organizations should put more focus in order to stop tilting at windmill.
|Case Study: Improving a Mature Hunt Program|
SANS Threat Hunting Summit 2019
David Bianco and Cat Self discuss coming into an existing threat hunting program, prioritizing areas for improvement, and implementing those improvements to make a great hunting program even better.
|NEW – Linux Shell Survival Guide v2.3|
This guide is a supplement to the SANS FOR572: Advanced Network Forensics and Analysis by course author Phil Hagen. It covers some of what we consider the most useful Linux shell primitives and core utilities.
|UPDATED – Find Evil Poster|
The FOR508: Advanced Incident Response, Threat Hunting & Digital Forensics course poster helps you understand lateral movement tools and techniques. It provides information on how to hunt more efficiently, quickly perform incident response scoping, and better anticipate future attacker activity.
Memory Forensics SkillBuilder Series: User-Mode Process Dump Analysis with WinDbg
In this webcast series, FOR526: Advanced Memory Forensics & Threat Detection course author Alissa Torres walks through analysis of process dumps to uncover code injection, user-mode hooking and user activity.
Adversaries have been coming to our networks for nearly 20 years, repeating the same intrusions day after day, while we repeat more or less the same responses day after day. In this talk Rob Lee exploriesthe hunting culture over the years and studying what works, what doesn’t, and what the future holds.
|WEBCAST: The State of Malware Analysis – Advice from the Trenches|
When investigating an incident, we seek useful, actionable information about the malicious software discovered on the affected systems. What tools and techniques can assist with such efforts? Course author Lenny Zeltser along with FOR 610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques course instructors Jim Clausing, Evan Dygert, Anuj Soni and Jake Williams share perspectives on the state of malware analysis.
|Distributed Evidence Collection and Analysis with Velociraptor: Fast, Surgical, at Scale…and Free! |
DFIR Summit 2019
Operating System & Device In-Depth Forensics
|NEW – Interactive Mobile Forensics Poster|
All the content from the FOR585: Smartphone Forensic Analysis In-Depth course poster in an
|UPDATED: Mac Forensics Reference Cheat-Sheet|
Authored by FOR518: Mac & iOS Forensic Analysis & Incident Response course author Sarah Edwards, this cheat-sheet describes the core functions and details of the HFS+ Filesystem.
|WEBCAST: Cloud Storage Acquisition from End Point Devices|
Cloud storage data can be more accessible on the local device and can contain files and metadata distinctly different than the current cloud repository. However, endpoint collection includes its own set of challenges. In this webcast, SANS Senior Instructor co-author of the FOR500: Windows Forensic Analysis course Chad Tilbury, discusses these challenges and provide a strategy for ensuring you are not missing critical evidence in your investigations.
Read the Cloud Storage Acquisition from End Point Devices Blog
|Finding Evil in Windows 10 Compressed Memory|
DFIR Summit 2019
This presentation discusses the application of that research in finding malware from real investigations that had previously been inaccessible in memory snapshots.
|Webcast: How to start with the SIFT WorkStation||Poster: EZTools Command Poster|
EZTools – Cutting-edge open-source windows based digital forensics tool suite for scalable, scriptable, fast forensics.
|Webcast: SOF-ELK – A free, Scalable Analysis Platform for Forensic, Incident Response, and Security Operations|
In this webcast, FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response course author Phil Hagen explores SOF-ELKs use cases, types of log data currently supported, as well as how to load data from live or archived sources. We will also show the various dashboards supplied with the VM and show how new features can be activated through the projects GitHub repository.
|Cheat-sheet: REMnux Usage Tips for Malware Analysis on Linux|
Authored by FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques course and REMnux Distribution author Lenny Zeltser, this cheat sheet outlines the tools and commands for analyzing malicious software on the REMnux Linux Distribution.
|Other Important Resources and Information|
We look forward to seeing you Live Online at the DFIR Summit! And remember, friends do not let friends miss the free summit, so please make sure to share the good news to anybody that could benefit from the event.
|SANS DFIR | Twitter | Community List | Facebook | Community List | LinkedIn | YouTube | Free Resources|
*** This is a Security Bloggers Network syndicated blog from SANS Blog authored by SANS Blog. Read the original post at: http://feedproxy.google.com/~r/SANSForensics/~3/wyvk_EcfKC8/17k-dfir-registrations-and-counting-deep-dive-into-this-content-before-you-join-us-next-week-