Hello, I have had the absolute pleasure to be reading and working though this book ` Learn Computer Forensics: Your one-stop guide to searching, analysing, acquiring, and securing digital evidence, 2nd Edition`. “Computer Forensics, being a broad topic, involves a variety of skills which will involve seizing electronic evidence, acquiring data from electronic evidence, data…
Tag: Security

Interview With DFIR Legend Brett Shavers
If there were a Mount Rushmore or people in DFIR this person would be on it. He has been in the scene for a long time and runs the excellent resource https://www.dfir.training/ “All things Digital Forensics/Incident Response, DFIR. Software, hardware, training, education, white papers, blog lists, social media contacts, service provider directory, books, jobs, Wikis,…

Turning more of a focus onto DFIR (Digital Forensics & Incident Response) and Hacking here at The Security Noob!
Hello, So, as it says in the title I am going to be doing a ‘soft reboot’ of the website and making my blog more DFIR/Hacking specifically dedicated to that subjects and will try to explain here why and speak about some posts and interviews that I have planned. When it comes to most careers…

HACKING APIS (Breaking Web Application Programming Interfaces) by Corey J Ball for No Starch Press REVIEW
Have been reading through this beauty of a book from Corey Ball. Who is the Author Corey Ball? “Corey Ball is a cybersecurity consulting manager at Moss Adams, where he leads penetration testing services. He has over 10 years of experience working in IT and cybersecurity across several industries, including aerospace, agribusiness, energy, fintech, government…

Week Eleven of EC-Council Certified Incident Handler (ECIH) Version 2 Self-Study Training
Hey guys, If you haven’t read the previous articles here they are:- Week One Week Two Week Three Week Four Week Five Week Six Week Seven Week Eight Week Nine Week Ten So, moving onto module 9 and the FINAL MODULE!!!! So, what are we covering in the final module? Introduction to Insider Threats Insider…

Week Nine of EC-Council Certified Incident Handler (ECIH) Version 2 Self-Study Training
Hey guys, If you haven’t read the previous articles here they are:- Week One Week Two Week Three Week Four Week Five Week Six Week Seven Week Eight So, moving onto module 7 and seeing as we are covering web application security it will come as no surprise that this is the BIGGEST module of…

Week Eight of EC-Council Certified Incident Handler (ECIH) Version 2 Self-Study Training
Hey guys, If you haven’t read the previous articles here they are:- Week One Week Two Week Three Week Four Week Five Week Six Week Seven So, moving onto module 6. Introduction to Network Security Incident Common Network Security Incidents Need for Network Security Incident Handling and Response Preparation for Handling Network Security Incidents Preparation…

Interview with Investigator, NCPTF Director of Intelligence, and OSINT Games Co-creator Griffin Glynn (@hatless1der)
In looking out for people to interview for this site it came about and still is to this day just me wanting to speak to people I am fascinated with and want to ask questions too and one of them is Griffin. He is an investigator with over 20 years’ experience with a background resolving…

Week Seven of EC-Council Certified Incident Handler (ECIH) Version 2 Self-Study Training
Hey guys, If you haven’t read the previous articles here they are:- Week One Week Two Week Three Week Four Week Five Week Six So, moving onto module 5 ‘Handling and Responding to Email Security Incidents’ and I am expecting to breeze through this as it’s the one I have done most work previously on….

Week Six of EC-Council Certified Incident Handler (ECIH) Version 2 Self-Study Training
Hey guys, If you haven’t read the previous articles here they are:- Week One Week Two Week Three Week Four Week Five So, moving onto module 4 ‘Handling and Responding to Malware Incidents’. Understand the concept of malware incident response (IR) Define different types of malware and their propagation Discuss preparation required to handle malware…