Table of Contents
- Understanding Incident Response
- Managing Cyber Incidents
- Fundamentals of Digital Forensics
- Investigation Methodology
- Collecting Network Evidence
- Acquiring Host-Based Evidence
- Remote Evidence Collection
- Forensic Imaging
- Analyzing Network Evidence
- Analyzing System Memory
- Analyzing System Storage
- Analyzing Log Files
- Writing the Incident Report
- Ransomware Preparation and Response
- Ransomware Investigations
- Malware Analysis for Incident Response
- Leveraging Threat Intelligence
- Threat Hunting

