December 2021
Beginner
550 pages
20h 48m
English
© Ornithopter/Shutterstock
DESPITE THE BEST DEFENSES, SOME CYBERATTACKS MAY SUCCEEED. When faced with the results of a successful attack, cybersecurity professionals must know how to respond to protect the information technology (IT) infrastructure from future attacks. Successful attacks not only leave a trail of damage but also artifacts of what happened, commonly called evidence, that can be used to examine what happened, how it happened, and possibly even who carried out the attack. Digital forensics focuses on the use of technology to investigate the facts leading up to and surrounding computer security incidents. ...