CYBER 5W

CYBER 5W

The Art of DFIR Training

Network Forensics With Wireshark

Network Forensics With Wireshark

Understanding how we can perform Forensics on network captures using Wireshark tool

in
How SIEM Works

How SIEM Works

Understanding how SIEM Works

in
CyberGate Technical Analysis

CyberGate Technical Analysis

Analysis of CyberGate RAT

in
Google Drive Forensics

Google Drive Forensics

Understanding how to forensically analyze Google Drive

in
Windows Registry Analysis

Windows Registry Analysis

understanding how Registry works in windows and how to analyze it

in
Windows Event Logs Analysis

Windows Event Logs Analysis

understanding how Event logs work in windows and how to analyze them

in
Writing YARA Rules

Writing YARA Rules

How to write a good YARA Rule

in
 Email Forensics

 Email Forensics

Looking at how you can perform an investigation and detect malicious Emails

in