SANS FOR509.4 Google Workspace Forensics and IR
فهرست مطالب کتاب Google Workspace Forensics and IR:
- Section 4.1: Understanding Google Workspace
- Section 4.2: Google Workspace Evidence
- Section 4.3: ATT&CKing Workspace
- Section 4.4: Workspace Evidence in Google Cloud
SANS FOR509.5 Google Cloud
فهرست مطالب کتاب Google Cloud:
Section 5.1: Understanding Google Cloud
Section 5.2: Log Sources, Collection, & Log Routing
Section 5.3: VM & Storage Investigations
Section 5.4: Google Cloud Network Forensics
Section 5.5: Kubernetes Forensics and IR
SANS FOR518.1 Mac and iOS Essentials
فهرست مطالب کتاب SANS FOR518.1 Mac and iOS Essentials:
ندارد
SANS FOR518.2 System Triage and File Systems
فهرست مطالب کتاب SANS FOR518.2 System Triage and File Systems:
ندارد
SANS FOR518.3 User Data – System Configuration and Log Analysis
فهرست مطالب کتاب SANS FOR518.3 User Data – System Configuration and Log Analysis:
ندارد
SANS FOR518.4 Application Data Analysis
فهرست مطالب کتاب SANS FOR518.4 Application Data Analysis:
ندارد
SANS FOR518.5 Advanced Analysis Topics
فهرست مطالب کتاب SANS FOR518.5 Advanced Analysis Topics:
ندارد
SANS FOR585.1 – Smartphone Overview
فهرست مطالب کتاب SANS FOR585.1 – Smartphone Overview:
Section 1.1: The SIFT
Workstation Section 1.2: Smartphone Fundamentals
Section 1.3: Cellebrite Physical Analyzer
Fundamentals Section 1.4: AXIOM Fundamentals
Section 1.5: SQLite Databases Overview
Section 1.6: Android
Forensics Overview Section 1.7: Android Backups
SANS FOR585.2 Android Forensics
فهرست مطالب کتاب SANS FOR585.2 Android Forensics:
Section 2.1: Android Acquisition Considerations
Section 2.2: Locked Android Devices
Section 2.3: Android File System Structures
Section 2.4: Android Evidentiary Locations
Section 2.5: Advanced Decoding and Traces of User Activity
Section 2.6: Google Cloud Extractions and Analysis
SANS FOR585.3 iOS Device Forensics
فهرست مطالب کتاب SANS FOR585.3 iOS Device Forensics:
Section 3.1: iOS Forensics Overview
Section 3.2: iOS Device Acquisition Considerations
Section 3.3: iOS File System Structures
Section 3.4: iOS Evidentiary Locations
Section 3.5: Handling Locked iOS Devices
Section 3.6: Advanced Decoding and Traces of User Activity