Practical Cyber Forensics (eBook)
XXVI, 488 Seiten
Apress (Verlag)
978-1-4842-4460-9 (ISBN)
- Carry out forensic investigation on Windows, Linux, and macOS systems
- Detect and counter anti-forensic techniques
- Deploy network, cloud, and mobile forensics
- Investigate web and malware attacks
- Write efficient investigative reports
Mr Niranjan Reddy is a renowed and passionate Information Security professional who specializes in Cyber Security & Digital Forensics. He has a hands-on experience in almost all domains of Information Security specializing in Cyber Forensics. He is an Electronics Graduate and possess numerous International Certifications under his belt to name a few are MCSE,CCNA,Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI), EC-Council Certified Security Analyst (ECSA), Certified Information System Security Professional(CISSP),Offensive Security Certified Professional(OSCP),ISO-27000:2013-Lead Auditor and many more.He is a Mentor,Enetrpreneur, Founder & CTO of NetConclave Systems which is an IT Security Consulting,Services & Trainings firm headquartered in Pune-India.
He was awarded the Global ECCouncil Excellence Instructor Award for 9 years in a row (2009-2017) in the South Asia category by ECCouncil,USA for corporate trainings and his contributions to the Infosec domain. .His articles on forensics and cyber security have been featured in many international and domestic publications such as Hakin9, E-Forensics,D46 magazine,India Legal, etc.
He has 14+ years plus of rich global experience in field of Information Security, Digital Forensics, Security Audits, Cyber Laws and Incident Response and handled critical runaway projects worldwide. He has been a speaker at various international & domestic conferences such as GroundZero, National Information Security Summit(NISS),ECCouncil International Cyber Security Summit in Colombo,HAKON, Hackers Day,NASSCOMM,Inforsecon at GFSU National Cyber Defence Research Center(NCDRC),ISACA Pune chapter and many more.He has also authored various articles on information security and Digital forensics,Cyber Crime Investigations in many domestic and international print media's like e-forensics,Hakin9, India Legal ,Digital 4N6 magazine Gulf Times, Daily-Financial Times Daily-Colombo,Times Of India,Mid-Day,Sakal Times & many more besides being featured on Radio and Televison channels.
Become an effective cyber forensics investigator and gain a collection of practical, efficient techniques to get the job done. Diving straight into a discussion of anti-forensic techniques, this book shows you the many ways to effectively detect them. Now that you know what you are looking for, you'll shift your focus to network forensics, where you cover the various tools available to make your network forensics process less complicated. Following this, you will work with cloud and mobile forensic techniques by considering the concept of forensics as a service (FaSS), giving you cutting-edge skills that will future-proof your career.Building on this, you will learn the process of breaking down malware attacks, web attacks, and email scams with case studies to give you a clearer view of the techniques to be followed. Another tricky technique is SSD forensics, so the author covers this in detail to give you the alternative analysis techniques you'll need. To keep you up to speed on contemporary forensics, Practical Cyber Forensics includes a chapter on Bitcoin forensics, where key crypto-currency forensic techniques will be shared. Finally, you will see how to prepare accurate investigative reports. What You Will LearnCarry out forensic investigation on Windows, Linux, and macOS systemsDetect and counter anti-forensic techniques Deploy network, cloud, and mobile forensicsInvestigate web and malware attacksWrite efficient investigative reportsWho This Book Is ForIntermediate infosec professionals looking for a practical approach to investigative cyber forensics techniques.
Erscheint lt. Verlag | 16.7.2019 |
---|---|
Zusatzinfo | XXVI, 488 p. 329 illus. |
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Mathematik / Informatik ► Informatik ► Programmiersprachen / -werkzeuge | |
Schlagworte | detection • Forensics • Hacking • Investigations • Malware • Recovery • Spyware |
ISBN-10 | 1-4842-4460-5 / 1484244605 |
ISBN-13 | 978-1-4842-4460-9 / 9781484244609 |
Haben Sie eine Frage zum Produkt? |
Größe: 32,8 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich