SANS security Collection
Results 1 to 1 of 1
  1. #1
    ~IronMan~'s Avatar
    Member InfoShowcaseActivity StatusThanks / Tagging Info
    join date|Join Date
    Nov 2006
    At Home
    post count|Posts
    reputation|Rep Power
    flag|Country: Users Flag!

    SANS security Collection

    SANS security Collection
    Unpatched, unprotected computers connected to the internet are compromised in less than three days. Government regulations and organizational policy might require computer forensic investigators to investigate intellectual property theft, harassment, and regulatory compliance. Investigators must master a variety of operating systems, investigation techniques, incident response tactics, and even legal issues in order to solve their cases. This course will teach you forensic techniques and tools in a hands-on setting for both Windows- and Linux-based investigations. This course emphasizes a hands-on approach where you will learn in-depth forensic functionality and how to solve a variety of incidents.

    Most incident response and security personnel will need to be familiar with core forensic techniques in order to respond to a variety of incidents for their organizations. This course teaches investigators how to follow the trail typical for intrusions and incidents that they might encounter. Incident responders should learn how intruders breached the infrastructure to identify additional systems/networks that are compromised. You will learn how to investigate traces left by complex attacks using the latest exploit methodologies.

    Learning more than just how to use a forensic tool, you will be able to demonstrate how the tool functions step-by-step. You will become skilled with tools, such as the Sleuthkit, Foremost, and the HELIX Forensics Live CD. We will rapidly move on to advanced forensic and investigation analysis topics and techniques. This SANS hands-on technical course arms you with a deep understanding of the forensic methodology, tools, and techniques to solve even the most difficult case.

    FIGHT CRIME. UNRAVEL INCIDENTS... ONE BYTE AT A TIME. We not only teach a firm understanding of the computer forensics tools and techniques, we also teach you the legally approved forensic methodology that will result in success.

    As part of the course, you will receive the SANS Investigative Forensic Toolkit (SIFT). Using the hardware and software in this toolkit, you will gain first-hand experience in collecting and analyzing evidence recovered from a system under investigation. You will learn best practices on how to investigate and recover deleted data. The course will demonstrate how forensic tools recover evidence so you can articulate how the tool works in depth. We will examine various investigation methodologies and techniques discovering new places to find evidence and discover the tracks of a motivated suspect who is trying to stay hidden.

    The SIFT Toolkit consists of:

    -Hard Drive USB evidence acquisition kit for SATA/IDE hard drives 1.8"/2.5"/3.5"/5.25"
    -HELIX incident response & computer forensics live CD
    -SANS VMware-based forensic analysis workstation equipped to investigate forensic data
    -Course DVD loaded with case examples, tools, and documentation
    -Best-selling book File System Forensic Analysis by Brian Carrier

    SANS SEC504 Hacker Techniques, Exploits & Incident Handling CD ISO
    655 MB | HotFile, RapidShare, Megaupload

    If your organization has an Internet connection and one or two disgruntled employees (and whose doesn't!), your computer systems will get attacked. From the five, ten, or even one hundred daily probes against your Internet infrastructure to the malicious insider slowly creeping through your most vital information assets, attackers are targeting your systems with increasing viciousness and stealth.

    By helping you understand attackers' tactics and strategies in detail, giving you hands-on experience in finding vulnerabilities and discovering intrusions, and equipping you with a comprehensive incident handling plan, the in-depth information in this course helps you turn the tables on computer attackers. This course addresses the latest cutting-edge insidious attack vectors and the "oldie-but-goodie" attacks that are still so prevalent, and everything in between. Instead of merely teaching a few hack attack tricks, this course includes a time-tested, step-by-step process for responding to computer incidents; a detailed description of how attackers undermine systems so you can prepare, detect, and respond to them; and a hands-on workshop for discovering holes before the bad guys do. Additionally, the course explores the legal issues associated with responding to computer attacks, including employee monitoring, working with law enforcement, and handling evidence.


  2. # 1a
    SANS security Collection

    Join Date
    Jan 2009
    Advertising world

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. CCIE.Security.V3.CCBootcamp.&.Internetwork.Expert. Security
    By ~IronMan~ in forum Guides/Tutorials
    Replies: 0
    Last Post: 16th November 2010, 16:15
  2. CCIE Security V3 CCBootcamp & Internetwork Expert Security
    By ~IronMan~ in forum Guides/Tutorials
    Replies: 0
    Last Post: 16th November 2010, 16:02
    By ~IronMan~ in forum Guides/Tutorials
    Replies: 0
    Last Post: 16th November 2010, 15:57
  4. Replies: 0
    Last Post: 26th October 2010, 19:39
  5. Idea Star Singer 2008 -Peter Bobby Sans "Devadhundhubi"
    By ~IronMan~ in forum Initial Stage
    Replies: 0
    Last Post: 24th October 2008, 18:24

User Tag List

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts