CYBER 5W

CYBER 5W

The Art of DFIR Training

Google Drive Forensics

Google Drive Forensics

Understanding how to forensically analyze Google Drive

in
Windows Registry Analysis

Windows Registry Analysis

understanding how Registry works in windows and how to analyze it

in
Windows Event Logs Analysis

Windows Event Logs Analysis

understanding how Event logs work in windows and how to analyze them

in
Writing YARA Rules

Writing YARA Rules

How to write a good YARA Rule

in
 Email Forensics

 Email Forensics

Looking at how you can perform an investigation and detect malicious Emails

in
 Unpacking Malware Manually

 Unpacking Malware Manually

A Walkthrough of one of the most used unpacking techniques

in
Hard disk structure and analysis

Hard disk structure and analysis

Looking at how Hard disks work and how to extend their investigation

in
Analyzing Macro enabled Office Documents

Analyzing Macro enabled Office Documents

Learn how to analyze MS Office Macro enabled Documents, a step-by-step guide to identifying and reversing malicious macros, and how to use olevba and cyberchef to decode and analyze the macro code. Analyzing Macro enabled Office Documents, a comprehensive guide to malware analysis, reverse engineering, and forensic investigations.

in