Operations and Incident Response
From Smithnet Wiki
Revision as of 21:02, 17 February 2023 by
NickPGSmith
(
talk
|
contribs
)
(1 revision imported)
(
diff
)
← Older revision
|
Latest revision
(
diff
) |
Newer revision →
(
diff
)
Jump to navigation
Jump to search
Contents
1
Incident Response Programs
1.1
Build and incident response program
1.2
Creating an incident response team
1.3
Incident response communication plan
1.4
Incident identification
1.5
Escalation and notification
1.6
Mitigation
1.7
Incident eradiation and recovery
1.8
Validation
1.9
Post0incident activities
1.10
Incident response exercises
2
Attack Frameworks
2.1
MITRE ATT&CK
2.2
Diamond Model of Intrusion Analysis
2.3
Cyber kill chain analysis
3
Incident Investigation
3.1
Logging security information
3.2
Security information and event management
3.3
Cloud audits and investigations
4
Forensic Techniques
4.1
Conducting investigations
4.2
Evidence types
4.3
Introduction to forensics
4.4
System and file forensics
4.5
File carving
4.6
Creating forensic images
4.7
Digital forensic images
4.8
Operating system analysis
4.9
Password forensics
4.10
Network forensics
4.11
Software forensics
4.12
Mobile device forensics
4.13
Embedded device forensics
4.14
Chain of custody
4.15
eDiscovery and evidence production
4.16
Explitation frameworks
Incident Response Programs
Build and incident response program
Creating an incident response team
Incident response communication plan
Incident identification
Escalation and notification
Mitigation
Incident eradiation and recovery
Validation
Post0incident activities
Incident response exercises
Attack Frameworks
MITRE ATT&CK
Diamond Model of Intrusion Analysis
Cyber kill chain analysis
Incident Investigation
Logging security information
Security information and event management
Cloud audits and investigations
Forensic Techniques
Conducting investigations
Evidence types
Introduction to forensics
System and file forensics
File carving
Creating forensic images
Digital forensic images
Operating system analysis
Password forensics
Network forensics
Software forensics
Mobile device forensics
Embedded device forensics
Chain of custody
eDiscovery and evidence production
Explitation frameworks
Navigation menu
Personal tools
Log in
Namespaces
Page
Discussion
British English
Views
Read
View source
View history
More
Search
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Tools
What links here
Related changes
Special pages
Printable version
Permanent link
Page information