Table of Contents
- Introduction to the Cloud
- Trends in Cyber and Privacy Laws and Their Impact on DFIR
- Exploring the Major Cloud Providers
- DFIR Investigations – Logs in AWS
- DFIR Investigations – Logs in Azure
- DFIR Investigations – Logs in GCP
- Cloud Productivity Suites
- The Digital Forensics and Incident Response Process
- Common Attack Vectors and TTPs
- Cloud Evidence Acquisition
- Analyzing Compromised Containers
- Analyzing Compromised Cloud Productivity Suites

