بیش از نیمی از مشاغل در دنیای مدرن، از سیستمهای رایانهای استفاده میکنند. در دنیای امروزی، اکثریت قریب به اتفاق افراد 16 الی 30 ساله، روی مباحث دیجیتالی آشنا و یا گاها مسلط هستند. با این حال چند درصد از این افراد واقعا درک میکنند که زیر پوسته چه میگذرد؟ آیا میدانید رایانه یا تلفن هوشمند شما چه چیزهایی را میتواند در مورد شما به دیگران بگوید؟ آیا میدانید دسترسی و بهرهبرداری از آن اطلاعات برای هر کسی، چقدر آسان است؟ آیا از اینکه نمیدانید افراد فنی در مورد رایانهها و فایلها، دادهها و ابردادهها در مورد چه چیزی صحبت میکنند، خسته شدهاید؟ آیا میدانید با حذف یک فایل واقعا چه اتفاقی میافتد؟ آیا میخواهید درباره دیجیتال فارنزیک و واکنش به حوادث بیشتر بدانید؟ اگر به هر یک از موارد بالا "بله" پاسخ دادید، این دوره برای شما مناسب است. دوره SANS FOR308 دوره مقدماتی است که با هدف افرادی با پیشینه غیرفنی برگزار میشود تا درک درستی از نحوه ذخیره فایلها در رایانه یا تلفن هوشمند به زبان ساده ارائه دهد. درحقیقت دوره SANS FOR308 به گونهای طراحی شده است که نقطه شروعی در کاتالوگ موسسه SANS باشد و زمینهای را فراهم کند تا دانشجو آماده دورههای عمیقتر حوزه جرمشناسی دیجیتالی شود.
بسیاری از دورههای دیجیتال فارنزیک و پاسخ به رویدادها، بر تکنیکها و روشهای مورد استفاده در این زمینهها تمرکز دارند، که اغلب به اصول اصلی نمیپردازند: دیجیتال فارنزیک و پاسخ به حادثه چیست و چگونه میتوان از تحقیقات دیجیتالی و شواهد دیجیتالی بصورت قانونی استفاده کرد. اما دوره SANS FOR308 به آموزش کاربران بالقوه تیمهای دیجیتال فارنزیک و واکنش به حوادث کمک میکند تا آنها بهتر بفهمند این تیمها چه کار میکنند و چگونه میتوان از خدمات آنها بهتر استفاده کرد.
همانطور که در توضیحات بالاتر اشاره شد، دوره SANS FOR308 یک دوره مقدماتی از حوزه جرمشناسی دیجیتالی و پاسخگویی به حوادث است. سرفصلهای این دوره به گونهای طراحی و ارائه شده است تا کمترین میزان دانش فنی برای ورود به دوره نیاز باشد. ضمن اینکه با توجه به اینکه هدف دورههای آکادمی لیان، آمادگی دانشجو برای ورود به بازار کار است، به همین دلیل امکان تغییر سرفصلهای دوره بنا به صلاحدید استاد دوره وجود دارد.
همانطور که در توضیحات بالاتر اشاره شد، دوره SANS FOR308 یک دوره مقدماتی از حوزه جرمشناسی دیجیتالی و پاسخگویی به حوادث است. سرفصلهای این دوره به گونهای طراحی و ارائه شده است تا کمترین میزان دانش فنی برای ورود به دوره نیاز باشد. ضمن اینکه با توجه به اینکه هدف دورههای آکادمی لیان، آمادگی دانشجو برای ورود به بازار کار است، به همین دلیل امکان تغییر سرفصلهای دوره بنا به صلاحدید استاد دوره وجود دارد.
Overview
The volume of digital information in the world is growing at a scarily fast rate. In fact, 90 percent of the digital data that exists worldwide today was created within the last two years and it's not slowing down with, 2.5 quintillion bytes of new data created each and every day.
If you are investigating any matter, whether it is a crime, an administrative or civil issue, or trying to figure out how your network was compromised, you need evidence. If you are gathering intelligence you need information. The simple reality is that these days the vast majority of potential evidence or information that we can use, whether it is for investigations, court, or intelligence purposes, is digital in nature. To effectively conduct digital investigations, one needs to understand exactly what digital evidence is, where to find it, the issues affecting digital evidence, and the unique challenges facing digital evidence. This will allow one to understand the crucial role that digital forensics plays with regards to digital evidence.
Topics
MODULE 1.1: Understanding Digital Investigation
MODULE 1.2: Digital Forensics 101
The purpose of digital forensics
MODULE 1.3: Digital Evidence Overview
MODULE 1.4: Sources and Digital Evidence
MODULE 1.5: Digital Evidence Challenges
Device volumes
Device support/locked down devices
Overview
Digital forensics is the core set of principles and processes necessary to produce usable digital evidence and uncover critical intelligence
CSI and similar television shows has popularized forensics in the public consciousness and increased awareness of forensics. Digital forensics is the forensic discipline that deals with the preservation, examination and analysis of digital evidence. However, television and movies have created misunderstandings about exactly what digital forensics is and does. As a result, many people interested in forensics have no real understanding about what it entails.
These misperceptions have also seen lawyers that make use of digital evidence in court, investigators that need digital evidence to solve cases, information security practitioners responding to security incidents, and even people conducting digital forensics; making mistakes in relation to digital evidence, which can have negative consequences.
Digital forensics is crucial to ensure accurate and usable digital evidence, but it is important to understand exactly what it is, what it can do, and how it can be used. If you are a user of digital forensics and digital evidence, understanding exactly how digital forensics works will enable you to better make use of digital forensics and digital evidence. If you are a manager or supervisor of a digital forensic capacity, this will help you understand exactly how it should be functioning and how to build and maintain it. Finally, if you are a prospective digital forensics practitioner or an existing one, this will equip you with the fundamental knowledge and skills that form the core of the digital forensic profession.
Topics
MODULES 2.1: Digital Forensics Principles
Identification
MODULE 2.2: Documentation and Reporting
MODULE 2.3: Quality Assurance in Digital Forensics
MODULE 2.4: Digital Forensics Challenges
Overview
INCIDENT RESPONSE
Incident Response is the core set of principles and processes necessary to allow an organization to successfully respond, react and remediate against potential attack scenarios
Digital forensics deals with the preservation, examination and analysis of digital evidence. However, Incident Response is often the preceding activity that leads to the requirement to conduct a forensic investigation. If not executed properly, the Incident Response processes and team have the ability to inadvertently disrupt or damage subsequent forensic activities. It is therefore a vitally important aspect of an investigation.
The Incident Response team must be adept at recognizing incidents and responding appropriately to collect and preserve evidence, whilst identifying and containing the incident. This same team are also usually involved in Forensic Readiness planning, which defines what evidence may be useful in a number of attack scenarios and ensures that systems are configured to collect and retain this evidence. Evidence that is collected in advance of an investigation can provide vital clues to a digital forensic investigator and when used in addition to subsequently acquired data, can provide insights into what data may have changed during specified periods of time that may be pertinent to the case.
Digital Forensics and Incident Response therefore go hand-in-hand and are often referred to by the acronym DFIR. If you are a prospective or current digital forensics practitioner, understanding exactly how incident response works will enable you better leverage these teams before, during and after investigations to obtain the best and most useful evidence and improve reporting. If you do not plan to build a career in digital forensics, understanding how the Incident Response teams and processes work will demonstrate when and how to engage if you suspect an incident may have occurred and the types of actions on your part that may assist (or impair) any potential investigation, to provide you with the best possible outcome.
Topics
MODULE 3.1: Introduction to Incident Response
MODULE 3.2: Incident Response Standards
MODULE 3.3: Incident Response Challenges
Overview
The acquisition of digital evidence is the most critical part of the digital forensics process and as such it must be done right
Acquiring digital evidence is a crucial component in any investigation. Digital forensics is about finding answers, and if we cannot get to the evidence that we need, which is often stored on devices, in memory, on the wire or wireless, or in the Cloud, then we will never be able to get the answers we seek. Getting the digital evidence and selecting the appropriate method to obtain it can mean the difference between success and failure in an investigation.
The acquisition of digital evidence has evolved over the years and the old way of doing it may not always be the best or most effective way of getting the evidence and may actually compromise an investigation. By understanding the various strategies and methods that we have available to us to acquire digital evidence means that informed decisions can be made as to the best method to use to acquire evidence in a given situation or environment.
Topics
MODULE 4.1: Forensic Acquisition Principles and Standards
Data verification and integrity preservation
MODULE 4.2: Understanding Forensic Images
MODULE 4.3: Forensics Acquisition Processes
MODULES 4.4: Acquisition Challenges
Overview
The only way to get answers is to ask questions, and the only way to get the right answers is to ask the right questions
The key purpose of digital forensics is to find answers, and it is through the analysis process that digital forensics transforms raw data into either evidence or intelligence that we can use to answer the questions that we need answered. The use of technology is so integral to our day to day activities that it allows us an unprecedented opportunity to reconstruct what has happened in the past, to learn what is happening in the present, and even predict what may happen in the future, all based on the data available to us.
By understanding digital forensic analysis, we can see how we can ask the right questions in our investigations and intelligence efforts, how we can critically examine and analyze the data at hand in a manner that can withstand scrutiny and finally, understand the types of answers we can get.
Topics
MODULE 5.1: What Can Forensic Analysis Prove
When
Where
Why
MODULE 5.2: Planning the Examination
Identify what artefacts can answer your questions
MODULE 5.3: The Art and Science of Forensic Analysis
MODULE 5.4: Forensic Examination and Analysis Standards
MODULE 5.5: Forensic Examination and Analysis Challenges
SECTION 6
DOCUMENTING AND REPORTING IN DIGITAL FORENSICS
It doesn't matter how good your technical skills are, if you are not able to effectively document what you have done and report on your findings in a manner that non-technical people understand, your investigation is on shaky ground
Digital forensics is at its core about getting answers to questions, whether as evidence or intelligence. So, it is important that we can get the answers that we find in our investigations to the right people so that they can make decisions and act on what is found in the digital forensics process.
It is crucial that we are able to effectively communicate these answers to those people who need them, in a manner that is useful to them, and to be able to effectively support our answers. Not only must we be able to effectively communicate, but it is important that the users of these answers understand what our various reports means and how they can use them effectively. Without effective communication and understanding of what is communicated, all effort expended in the digital forensic process is lost.
Topics
MODULE 6.1: Presenting Your Findings
MODULE 6.2: Legal Evidence
Legality
Reliability of the evidence
MODULE 6.3: Testifying in Court
Overview
Good management of a digital forensic or incident response team is key in allowing an organization to successfully respond to potential attack scenarios and investigate digital evidence
Management of a DFIR team is crucial to the success or failure of investigations. This includes suitably preparing the team and environment, providing support throughout each case, escalating issues as required, as well as conducting reviews and providing regular feedback. If sufficient management support is not in place at any stage in the lifecycle of an investigation, it may not be possible to proceed, or insufficient analysis may be conducted. Understanding how to build, manage and prepare a DFIR capability is essential.
Digital Forensic Readiness is the key element in preparation to allow an organization to successfully respond to potential attack scenarios and investigate digital evidence. Digital forensic readiness acknowledges and defines the tools, processes and resources that must be in place to allow an organization to suitably deal with Digital Forensic investigations and Incident Response cases. If Readiness policies and processes are not defined properly, digital evidence may be unsuitable or may not be available when required, which can hinder or entirely prevent an investigation. It is therefore a vitally important aspect of pre-investigation planning.
MODULE 7.1: Introduction to Forensic Readiness
MODULE 7.2: The need for Forensic Readiness
MODULE 7.3: Building and Managing a DFIR Capacity
DIGITAL FORENSICS CHALLENGE
Consolidation of the skills and knowledge learned throughout the course with a hands-on challenge
The best consolidation of new skills and knowledge is through practice. On day 6, you will have the option to undertake an individual hands-on challenge that makes use of the SANS virtual cyber range. Your digital forensics skills are put to the test with a variety of scenarios involving mounting evidence, identifying data and metadata, decoding data and decrypting data. Knowledge of digital forensics and incident response processes and standards will also be tested when answering scoring server questions, to compete for the FOR308 Challenge Coin. These challenged strengthen the student’s understanding of digital evidence, digital forensics, and incident response fundamentals, and provide a learning opportunity where more practice on specific skills may be useful.
Topics
The students who score the highest on the digital forensics fundamentals challenge will be awarded the coveted SANS Digital Forensics Lethal Forensicator Coin. Game on!
طبق گفته موسسه SANS این دوره هیچ پیشنیازی ندارد اما توصیه میکنیم قبل از گذراندن این دوره، حتما دوره جامع مقدمات امنیت سایبری (که شامل دورههای Network+، Security+، Linux Essentials و پایتون میشود) را بگذرانید. ضمن اینکه داشتن درکی مقدماتی از حملات رایج سایبری نیز میتواند به درک بهتر مفاهیم کمک کند.