SANS FOR498: Battlefield Forensics & Data Acquisition

شرکت SANS یکی از بزرگترین شرکت های آموزشی در حوزه امنیت سایبری می باشد و شامل طیف وسیعی از دوره های تست نفوذ و جرم شناسی و دفاع سایبری می باشد این پکیج آموزشی شامل مجموعه ایی از دوره های پیشرفته تست نفوذ شرکت SANS می باشد و تدریس بر اساس آخرین سیلابس شرکت SANS می باشد در این دوره آموزشی SANS FOR498: Battlefield Forensics & Data Acquisition با روش ها و تکنیک های پیشرفته برای آنالیز Malware تحت شبکه و جمع آوری اطلاعات در محل جرم آشنا خواهند شد از طرفی با روش ها شناسایی Malware نیز آشنا خواهند شد و در نهایت شما می توانید با روش های هوشمند شناسایی تهدیدات در یک سازمان آشنا شوید.

آنچه در دوره SANS FOR498: Battlefield Forensics & Data Acquisition خواهید آموخت

  • آشنایی با روش های استخراج اطلاعات از محیط جرم
  • روش های Threat Hunting
  • روش های پیشرفته جرم شناسی تحت شبکه
  • روش های هوشمند برای شناسایی تهدیدات شبکه

لینک دانلود دوره SANS FOR498: Battlefield Forensics & Data Acquisition 2020


دانلود – PDF+WorkBook – حجم : 108 مگابايت

دانلود – Video – بخش اول – حجم : 8 گیگابايت
دانلود – Video – بخش دوم
دانلود – Video – بخش سوم
دانلود – Video – بخش چهارم
دانلود – Video – بخش پنجم
دانلود – Video – بخش ششم
دانلود – Video – بخش هفتم
دانلود – Video – بخش هشتم
دانلود – Video – بخش نهم

رمز فايل:

Date 2020
Price: 4,350 USD
Publisher: SANS

Syllabus (36 CPEs)

FOR498.1: Evidence File Quick Wins and Storage Interfaces
FOR498.2: Portable Devices and Evidence Acquisition
FOR498.3: Quick Win Forensics
FOR498.4: Non-Traditional and Cloud Acquisition
FOR498.5: Apple Acquisition, Internet of Things, and Online Attribution
FOR498.6: Beyond the Forensic Tools: The Deeper Dive

What You Will Learn


FOR498: Battlefield Forensics & Acquisition Course will help you to:

  • Acquire data effectively from:
    • PCs, Microsoft Surface, and Tablet PCs
    • Apple Devices, and Mac, and Macbooks
    • RAM and Memory
    • Smartphones and portable mobile devices
    • Cloud storage and services
    • Network storage repositories
  • Produce actionable intelligence in 90 minutes or less

The first step in any investigation is the gathering of evidence. Digital forensic investigations are no different. The evidence used in this type of investigation is data, and this data can live in many varied formats and locations. You must be able to first identify the data that you might need, determine where that data resides, and, finally, formulate a plan and procedures for collecting that data.

With digital forensic acquisitions, you will typically have only one chance to collect data properly. If you manage the acquisition incorrectly, you run the risk of not only damaging the investigation, but more importantly, destroying the very data that could have been used as evidence.

With the wide range of storage media in the marketplace today, any kind of standardized methodology for all media is simply untenable. Many mistakes are being made in digital evidence collection, and this can cause the guilty to go free and, more importantly, the innocent to be incarcerated. The disposition of millions and millions of dollars can rest within the bits and bytes that you are tasked with properly collecting and interpreting.

An examiner can no longer rely on “dead box” imaging of a single hard drive. In today’s cyber sphere, many people utilize a desktop, laptop, tablet, and cellular phone within the course of a normal day. Compounding this issue is the expanding use of cloud storage and providers, and the proper collection of data from all these domains can become quite overwhelming.

This in-depth digital acquisition and data handling course will provide first responders and investigators alike with the advanced skills necessary to properly respond to, identify, collect, and preserve data from a wide range of storage devices and repositories, ensuring that the integrity of the evidence is beyond reproach. Constantly updated, FOR498 addresses today’s need for widespread knowledge and understanding of the challenges and techniques that investigators require when addressing real-world cases.

Numerous hands-on labs throughout the course will give first responders, investigators, and digital forensics teams practical experience needed when performing digital acquisition from hard drives, memory sticks, cellular phones, network storage areas, and everything in between.

During a digital forensics response and investigation, an organization needs the most skilled responders possible, lest the investigation end before it has begun. FOR498: Battlefield Forensics & Acquisition will train you and your team to respond, identify, collect, and preserve data no matter where that data hides or resides.

You Will Be Able To

  • Learn and master the tools, techniques, and procedures necessary to effectively locate, identify, and collect data no matter where it is stored
  • Handle and process a scene properly to maintain evidentiary integrity
  • Perform data acquisition from at-rest storage, including both spinning media and solid-state storage
  • Identify the numerous places that data for an investigation might exist
  • Perform Battlefield Forensics by going from evidence seizure to actionable intelligence in 90 minutes or less
  • Assist in preparing the documentation necessary to communicate with online entities such as Google, Facebook, Microsoft, etc.
  • Understand the concepts and usage of large-volume storage technologies, including JBOD, RAID storage, NAS devices, and other large-scale, network addressable storage
  • Identify and collect user data within large corporate environments where it is accessed using SMB
  • Gather volatile data such as a computer system’s RAM
  • Recover and properly preserve digital evidence on cellular and other portable devices
  • Address the proper collection and preservation of data on devices such as Microsoft Surface/Surface Pro, where hard-drive removal is not an option
  • Address the proper collection and preservation of data on Apple devices such as MacBook, MacBook Air, and MacBook Pro, where hard-drive removal is not an option
  • Properly collect and effectively target email from Exchange servers, avoiding the old-school method of full acquisition and subsequent onerous data culling
  • Properly collect data from SharePoint repositories
  • Access and acquire online mail stores such as Gmail, Hotmail, and Yahoo Mail accounts

FOR498: Battlefield Forensics & Acquisition Course Topics

  • Advanced use of a wide range of best-of-breed, open-source tools in the SANS Windows 10 environment, as well as other external tools to perform proper data acquisition and evidence handling
  • Rapid incident response collection of artifacts to quickly further the investigation without waiting for completion of a forensic image
  • Remote and enterprise digital evidence collection
  • Windows live artifact collection
  • Memory collection
  • Volume shadow copy acquisition
  • Understanding advanced storage containers such as RAID, EMC, and JBOD
  • Examination of file systems and how they hold data
  • Advanced understanding of proper evidence collection and scene management
  • Identifying data storage devices and locations
  • Properly identifying a vast array of interface styles and adapter usage
  • Gaining access to storage media using non-destructive methods
  • Accessing and collecting cloud-based storage containers, including online email such as Gmail and
  • Instruction specific to the acquisition of Apple devices
  • Methodologies for accessing and acquiring data from portable and cellular devices, as well as nontraditional devices such as GPS units and Internet of Things devices

What You Will Receive

SANS Windows SIFT Workstation

  • This course uses the SANS Windows DFIR Workstation extensively to teach first responders and forensic analysts how to respond to, acquire, and investigate even the most time-sensitive cases.
  • DFIR Workstation that contains hundreds of free and open-source tools, easily matching any modern forensic commercial suite
  • A virtual machine is used with many of the hands-on class exercises
  • Windows 10
  • VMWare Appliance ready to tackle forensics

F-Response Consultant Covert

  • Enables practitioner to access remote systems and physical memory of a remote computer via the network
  • Gives any forensics tool the capability to be used remotely
  • Perfect for network and cloud data acquisition and visibility
  • Deployable agent to remote systems
  • SIFT Workstation compatible
  • Vendor neutral – works with just about any tool
  • The six-month license allows it to continue to be used and benchmarked in your environment at work/home

Fully working licenses for 90 days:

  • Magnet Forensics Axiom
  • Cellebrite UFED Physical Analyzer and UFED 4PC
  • SafeBlock

Digital Download Package

  • Downoad package with case images, memory captures, DFIR Workstation, tools, and documentation

SANS DFIR Electronic Exercise Workbook

  • Electronic Exercise book with detailed step-by-step instructions and examples to help you master Battlefield Forensics

UltraDock Hardware Write Blocking Device

  • SATA to USB 3 adapter for 2.5″ bare hard drives
  • Note: this comes with a US plug. International students taking the course Live Online or OnDemand, please obtain an adapter.
  • Design
5 دیدگاه
  1. نیما says

    خیلی مچکر بابت آپلود این محتوا اما لینک دانلود کار نمیکنه!
    ممنون میشم بررسی کنید


آدرس ایمیل شما منتشر نخواهد شد.