Practical Cyber Forensics - Niranjan Reddy

Practical Cyber Forensics

An Incident-Based Approach to Forensic Investigations

(Autor)

Buch | Softcover
488 Seiten
2019 | 1st ed.
Apress (Verlag)
978-1-4842-4459-3 (ISBN)
48,14 inkl. MwSt
Become an effective cyber forensics investigator and gain a collection of practical, efficient techniques to get the job done. Diving straight into a discussion of anti-forensic techniques, this book shows you the many ways to effectively detect them. Now that you know what you are looking for, you’ll shift your focus to network forensics, where you cover the various tools available to make your network forensics process less complicated. Following this, you will work with cloud and mobile forensic techniques by considering the concept of forensics as a service (FaSS), giving you cutting-edge skills that will future-proof your career.
Building on this, you will learn the process of breaking down malware attacks, web attacks, and email scams with case studies to give you a clearer view of the techniques to be followed. Another tricky technique is SSD forensics, so the author covers this in detail to give you the alternative analysis techniques you’ll need. To keep you up to speed on contemporary forensics, Practical Cyber Forensics includes a chapter on Bitcoin forensics, where key crypto-currency forensic techniques will be shared. Finally, you will see how to prepare accurate investigative reports. 
What You Will Learn

Carry out forensic investigation on Windows, Linux, and macOS systems

Detect and counter anti-forensic techniques 

Deploy network, cloud, and mobile forensics

Investigate web and malware attacks

Write efficient investigative reports



Who This Book Is For
Intermediate infosec professionals looking for a practical approach to investigative cyber forensics techniques. 

Mr Niranjan Reddy is a renowed  and passionate Information Security professional who specializes in Cyber Security & Digital Forensics. He has a hands-on experience in almost all domains of Information Security specializing in Cyber Forensics. He is an Electronics Graduate and possess numerous International Certifications under his belt to name a few are MCSE,CCNA,Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI), EC-Council Certified Security Analyst (ECSA), Certified Information System Security Professional(CISSP),Offensive Security Certified Professional(OSCP),ISO-27000:2013-Lead Auditor and many more.He is a Mentor,Enetrpreneur, Founder & CTO of NetConclave Systems which is an IT Security Consulting,Services & Trainings firm headquartered in Pune-India. He was awarded the Global ECCouncil Excellence Instructor Award  for 9 years in a row (2009-2017) in the South Asia category by ECCouncil,USA for corporate trainings and his contributions to the Infosec domain. .His articles on forensics and cyber security have been featured in many international and domestic publications such as Hakin9, E-Forensics,D46 magazine,India Legal, etc. He has 14+ years plus of rich global experience in field of Information Security, Digital Forensics, Security Audits, Cyber Laws and Incident Response and handled critical runaway projects worldwide. He has been a speaker at various international & domestic conferences such as GroundZero, National Information Security Summit(NISS),ECCouncil International Cyber Security Summit in Colombo,HAKON, Hackers Day,NASSCOMM,Inforsecon at GFSU  National Cyber Defence Research Center(NCDRC),ISACA Pune chapter and many more.He has also authored various articles on information security and Digital forensics,Cyber Crime Investigations in many domestic and international print media’s like e-forensics,Hakin9, India Legal ,Digital 4N6 magazine Gulf Times, Daily-Financial Times Daily-Colombo,Times Of India,Mid-Day,Sakal Times & many more besides being featured on Radio and Televison channels.

Chapter 1: Introduction to Cyber Forensics- Chapter 2: Windows Forensics.- Chapter 3: Linux Forensics .- Chapter 4: MAC Forensics.- Chapter 5: Anti Forensics Techniques & Detection.- Chapter 6: Network forensics.- Chapter 7: Mobile forensics.- Chapter 8: Cloud forensics.- Chapter 9: Investigating Malware attacks.- Chapter 10: Investigating web attacks.- Chapter 11: Investigating email crimes.- Chapter 12: SSD Forensics.- Chapter 13: BitCoin Forensics.-Chapter 14:Cyber Laws Overview.-Chapter 15:Investigative Reports and Legal Acceptance.

Erscheinungsdatum
Zusatzinfo 329 Illustrations, black and white; XXVI, 488 p. 329 illus.
Verlagsort Berkley
Sprache englisch
Maße 178 x 254 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Schlagworte detection • Forensics • Hacking • Investigations • Malware • Recovery • Spyware
ISBN-10 1-4842-4459-1 / 1484244591
ISBN-13 978-1-4842-4459-3 / 9781484244593
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Konzepte – Verfahren – Protokolle

von Claudia Eckert

Buch | Hardcover (2023)
De Gruyter Oldenbourg (Verlag)
84,95