Cyber Security & Data Protection: A Strategic Integration Masterclass with Rosie Underwood

Rosie will, using her own experiences, talk through the importance of, and mutual benefit of bringing together Cyber Security and Data Protection as a powerful set of complementary measures to protect data, privacy and the security of assets. Often described as two sides of the same coin, the relationship between Cyber Security and Data Protection […]
White Paper: Cyber Incident Response
A fresh perspective on how businesses can better prepare for the future through incident response. Written by: Gary Hibberd. Business Continuity Incident Response Risk management White Paper Advanced Abstract Nothing stands still for long and as technology improves and people’s needs outreach technical capabilities, BCM practitioners the world over must be continually looking to see […]
OpSec… As Important As Locking Your Door
Want to leave behind spam calls, texts and emails? In this post, Mike Hudson shares how OpSec could come to your rescue. Data Management Operational Technology Article Open to all Do you ever go to bed at night and lie awake, wondering if you really did lock the front door? Eventually, you always get […]
The Art of Social Engineering Masterclass with Wynn Jones

In this talk, Wynn Jones will discuss the fundamentals of social engineering, with an exciting real life case study. This talk welcomes learners of all proficiency levels.
Memory Forensics – Answers
Part 1: Forensic memory analysis using Volatility 3 Activity 1: Identifying OS Information Dump analysis helps determine the OS profile. It is important to know the information about the operating system that was in use prior to the investigation. The command “-f” is used to specify the file and also specify the plugin required, in […]
Memory Forensics
Introduction to Memory Forensics Memory Forensics is the analysis of memory files acquired from digital devices. The primary purpose of Memory Forensics is to acquire useful information from the RAM that aids in the preparation of forensically sound evidence. Learning Outcome You will be able to utilize built-in Volatility 3 plugins for memory analysis tasks. […]
Mobile Forensics – Answers
Part 1: Android Forensics Analysis using ALEAPP 1. Copy the folder “Mobile Forensics” into the virtual machine desktop. 2. Unzip the “Android Logical Image” folder. 3. Create a new folder called “Android”. This folder will be selected as the output folder to store the parsed files. 4. Open the kali linux terminal and navigate to […]
Mobile Forensics
Introduction to Mobile Forensics Mobile forensics is the process of recovering digital evidence from mobile devices using accepted methods. Unlike traditional digital forensics processes, mobile forensics solely focuses on retrieving information from mobile devices such as smartphones, androids, and tablets. Learning Outcome You will be able to create a new case on ALEAPP and iLEAPP […]
Network Forensics – Answers
Introduction to Network Forensics? Network forensics is a sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection. Learning Outcome You will be able to upload and analyse pcap file using wireshark. You will be able to explain filtering techniques […]
Network Forensics
Introduction to Network Forensics? Network forensics is a sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection. Learning Outcome You will be able to upload and analyse pcap file using wireshark. You will be able to explain filtering techniques […]