Blog
Cyber Security Lifecycle
Cyber Threat
1

Cyber Security Lifecycle

Cyber Security Lifecycle Project Name: Cyber Security Lifecycle Description: Without applying a Lifecycle mechanism to a cyber security in any organization there arises an increased risk of cyber threats affecting the system. A systematic approach in any organization delivers and resist the cyber-attacks, persistent threats to a great extent. The cyber …

Read More
Types of System Software
Cyber Threat

Types of System Software

Types of System Software Project Name: Types of System Software Description: This blog will help to understand Types of System Software Author: Rohit D Sadgune / Amruta Sadgune Frequently Asked Question on Types of System Software What are different types of system software? What are the different types of software? …

Read More
cyber security controls india
Cyber Threat
1

Cyber Security Control

Cyber Security Control Project Name: Cyber Security Control Description: Cyber Security Control India blog will help each IT employee to understand information environment in better way. The components of Cyber Security Controls Author: Rohit D Sadgune Summary of Content Components Of Cyber Security Controls Basic Requirement of Cyber Security Controls …

Read More
Packet Analytics
Packet Forensics and Analytics

Packet Analytics

Packet Analytics Project Name: Packet Analytics Description: Packet Analytics includes understanding Packet. Both will perform this activity in Real Time so as to resolve many issues like DOS attack, DDOS Attack, Insider Threats, Access Intelligence, Bandwidth Issue and many more. Author: Rohit D Sadgune Frequently Asked Question on MOLOCH Packet …

Read More
Digital Evedance
Packet Forensics and Analytics

Moloch Packet Analytics

Moloch Packet Analytics Project Name:  Moloch Packet Analytics Description: Moloch Packet Analytics includes understanding MOLOCH and Elasticsearch to a great extent. Packet Forensics and Analytics will help you to understand MOLOCH for Packet Analytics & Elasticsearch for forensics indexing for packet. Both will perform this activity in Real Time so …

Read More
Live Evidence Invetigation
Packet Forensics and Analytics

Installation of MOLOCH

Installation of MOLOCH Project Name: Installation of MOLOCH Description: Packet Analytics includes understanding MOLOCH and Elasticsearch to great extent. In this blog we will try to figure out step by step installation of MOLOCH for Packet Analytics & Packet Forensics. Packet Forensics and Analytics will help you understand MOLOCH for …

Read More
MOLOCH Usage
Packet Forensics and Analytics

Moloch Usage

Moloch Usage Project Name: Moloch Usage Description: Moloch Usage includes understanding packet with respect to system level components, GUI views of MOLOCH Packet Analytics and MOLOCH Use Case. Author: Rohit D Sadgune Summary of Content System Level Concepts of MOLOCH Important Files & Folders Working with MOLOCH USE cases of …

Read More
File Forensics
General

How to investigate files

How to investigate files Project Name: How to investigate files Description:How to investigate files includes understanding of file system and there features, attributes. The new file system forensic analysis includes all new features security aspects of operating systems. Author: Rohit D Sadgune Summary of Content                      1.      FAT 2.      FAT32 3.      …

Read More
Live Evidence Investigation
ProDiscover

Live Evidence Investigation

  Live Evidence Investigation Project Name: Live Evidence Investigation Description: Live Evidence Investigation is a very difficult level of sophisticated job. In this blog we will try to understand step by step guide to concepts of Live Evidence Investigation. Author: Rohit D Sadgune Summary of Contents ·         RAM Forensics Basic …

Read More
Server Hacked
Linux Server Investigation

Compromised Linux Server Investigation

Compromised Linux Server Investigation Project Name: Compromised Linux Server Investigation Description: Compromised Linux Server Investigation in India is a very precise level of sophisticated job. In this blog we will try yo understand step by step guide to Linux server forensics investigation & incident response. In term of Compromised Linux Server …

Read More
prodiscover forensics
ProDiscover

How to use ProDiscover

How to use ProDiscover   Project Name: How to use ProDiscover Description: Step by step guide to How to use ProDiscover Incident Response customization Author: Rohit D Sadgune Summary of Contents In this blog we will learn following things How to start prodiscover incident response How to use ProDiscover Project …

Read More
Advance Data Recovery
Data Recovery

Advance Data Recovery

Advance Data Recovery 1.    Chances for Data Recovery of Deleted files 2.    Chances for Data Recovery of Formatted File Systems   Chances for Data Recovery of Deleted files Windows file systems Famous Windows file systems which includes FAT (with FAT32 extension), NTFS and newly produced file system ReFS for Windows …

Read More
Data Recovery Concept
Data Recovery

Data Recovery Concept

Data Recovery Concept   Data Recovery Concepts deal with following things What is data Loss Common Computer Problems Data Analysis Concepts Data Recovery Tips Data Recovery Technique Basic Data Recovery Advance Data Recovery Data Recovery is the process of extracting digital information in the form of data from damaged, failed, …

Read More
Data Recovery Basic
Data Recovery

Basic Data Recovery

Project Name: Basic Data Recovery Description: Basic Data Recovery will help all digital forensics investigator to perform perform data recovery. Author: Rohit D Sadgune Summary of Content Basic Data Recovery File System Recovery Phases of basic data recovery Data Recovery is the process of extracting digital information in form of …

Read More
Fraud Invetigation
General

Fraud Investigation Concept

fraud investigation concept

Read More
Forensics Analysis
Digital Forensics

Forensics Analysis in India

Forensics Analysis in India Computer Forensics: – Computer forensics is the scientific examination and analysis of data held on, or retrieved from, degital storage media in such a way that the information can be used as evidence in a court of law to conclude suspect to culprit.  The Computer Forensic …

Read More
ProDiscover

ProDiscover Incident Response Project

ProDiscover Incident Response Project   Project Name: ProDiscover Incident Response Project Description: Step by step guide to ProDiscover Incident Response Author: Rohit D Sadgune Summary of Contents In this blog we will learn following things how to start prodiscover incident response Project number & case files Adding suspected evidence drive …

Read More
Digital Evidence India
Digital Forensics
1

Digital Evidence India

Digital Evidence India Types of digital evidence India Digital Evidence India The Court and Rule of Evidence – Digital Evidence  Rules of Procedure (Data compaction, Data Duplication/Authentication by Expert Data Compilation Information Discoverable Verification/validation, Standard followed Digital Forensic Science tool, technique, Approach, analysis and Process the digital evidence These evidence …

Read More
Computer Forensics Fundamentals
General
1

Forensics Incident Response

The Document Describes The Forensics Incident Response Checklist For Incident Management Developing a Computer Security Incident Response Define your organization’s overall incident response structure. Develop and implement alert mechanisms that permit quick action. Establish a centralized reporting structure. Appoint and train incident response personnel. Recognizing Signs of an Intrusion Observe your …

Read More
Computer and Network Log Analytics
Cyber Threat

Computer and Network Log Analytics

Computer and Network Log Analytics Project Name: Computer and Network Log Analytics Description: This blog will help you to understand Computer and Network Log Analytics. Security Logs Category, Operating System Logs Analysis, Application Logs, Security Software Logs Analysis, Router Log Files Analysis, Linux Process Account Analysis, Windows Log Files Analysis Author: …

Read More
Power of Security Operation Center
Cyber Threat

Power of Security Operation Center

Power of Security Operation Center Project Name: Power of Security Operation Center Description: – Power of Security Operation Center is a concept of a highly skilled expert team working towards continuously monitoring and improving organizations security in the process of prevention, careful planning, detection and responding with a well-defined process. In …

Read More
Cyber Threat Analytics
Digital Forensics

Reconstructing Past Digital Events

Reconstructing Past Digital Events Project Name: Reconstruction of Past Digital Events Description: This blog will help all forensics investigator to Reconstruct of Past Digital Events. Author: Rohit D Sadgune Frequently Asked Question on Computer Forensics Investigation How to Reconstructing Past Digital Event Backup of Digital Events Importanance of Reconstructing Past …

Read More
ProDiscover

How to recover Master File Table

How to recover Master File Table

Read More
Computer Forensics Fundamentals
Digital Forensics

Computer Forensics Fundamentals

Computer Forensics Fundamentals Project Name: Computer Forensics Fundamentals Description: This blog will help all forensics investigator for Computer Forensics Fundamentals Author: Rohit D Sadgune Frequently Asked Question on Computer Forensics Investigation Checklist of Computer Forensics Fundamentals   Protect the suspected digital media during the forensic examination from any possible alteration, …

Read More
Principal Computer Forensic Activities Checklist Form
Digital Forensics
1

Digital Forensic Checklist

Digital Forensic Checklist Project Name: Digital Forensic Checklist Description: This blog will help all forensics investigator for Digital Forensic Checklist Author: Rohit D Sadgune Frequently Asked Question on Computer Forensics Investigation Checklist of Principal Digital Forensic Activities Checklist Form   Safely seize computer systems and files to avoid contamination and/or interference. …

Read More
Types of Computer Forensics Technology
Digital Forensics

Types of Computer Forensics Technology

Types of Computer Forensics Technology Project Name: Types of Computer Forensics Technology Description: This blog will help all forensics investigator for Types of Computer Forensics Technology Author: Rohit D Sadgune Frequently Asked Question on Computer Forensics Investigation Checklist of Types of Computer Forensics Technology   Move documentary evidence quickly from …

Read More
Digital Forensics

Types of Computer Forensics Systems

Types of Computer Forensics Systems Project Name: Types of Computer Forensics Systems Description: This blog will help all forensics investigator for Types of Computer Forensics Systems Author: Rohit D Sadgune Frequently Asked Question on Computer Forensics Investigation Checklist of Types of Computer Forensics Systems Have procedures in place to establish …

Read More
Power of Security Operation Center
Cyber Threat
Power of Security Operation Center

Power of Security Operation Center Project Name: Power of Security Operation Center Description: – Power of Security Operation Center is a concept of a highly skilled expert team working towards continuously monitoring and improving organizations security in the process of prevention, careful planning, detection and responding with a well-defined process. In …

Cyber Security Lifecycle
Cyber Threat
1
Cyber Security Lifecycle

Cyber Security Lifecycle Project Name: Cyber Security Lifecycle Description: Without applying a Lifecycle mechanism to a cyber security in any organization there arises an increased risk of cyber threats affecting the system. A systematic approach in any organization delivers and resist the cyber-attacks, persistent threats to a great extent. The cyber …

Types of System Software
Cyber Threat
Types of System Software

Types of System Software Project Name: Types of System Software Description: This blog will help to understand Types of System Software Author: Rohit D Sadgune / Amruta Sadgune Frequently Asked Question on Types of System Software What are different types of system software? What are the different types of software? …

cyber security controls india
Cyber Threat
1
Cyber Security Control

Cyber Security Control Project Name: Cyber Security Control Description: Cyber Security Control India blog will help each IT employee to understand information environment in better way. The components of Cyber Security Controls Author: Rohit D Sadgune Summary of Content Components Of Cyber Security Controls Basic Requirement of Cyber Security Controls …

Computer and Network Log Analytics
Cyber Threat
Computer and Network Log Analytics

Computer and Network Log Analytics Project Name: Computer and Network Log Analytics Description: This blog will help you to understand Computer and Network Log Analytics. Security Logs Category, Operating System Logs Analysis, Application Logs, Security Software Logs Analysis, Router Log Files Analysis, Linux Process Account Analysis, Windows Log Files Analysis Author: …

Packet Analytics
Packet Forensics and Analytics

Packet Analytics

Packet Analytics Project Name: Packet Analytics Description: Packet Analytics includes understanding Packet. Both will perform this activity in Real Time so as to resolve many issues like DOS attack, DDOS Attack, Insider Threats, Access Intelligence, Bandwidth Issue and many more. Author: Rohit D Sadgune Frequently Asked Question on MOLOCH Packet …

Digital Evedance
Packet Forensics and Analytics

Moloch Packet Analytics

Moloch Packet Analytics Project Name:  Moloch Packet Analytics Description: Moloch Packet Analytics includes understanding MOLOCH and Elasticsearch to a great extent. Packet Forensics and Analytics will help you to understand MOLOCH for Packet Analytics & Elasticsearch for forensics indexing for packet. Both will perform this activity in Real Time so …

Live Evidence Invetigation
Packet Forensics and Analytics

Installation of MOLOCH

Installation of MOLOCH Project Name: Installation of MOLOCH Description: Packet Analytics includes understanding MOLOCH and Elasticsearch to great extent. In this blog we will try to figure out step by step installation of MOLOCH for Packet Analytics & Packet Forensics. Packet Forensics and Analytics will help you understand MOLOCH for …

MOLOCH Usage
Packet Forensics and Analytics

Moloch Usage

Moloch Usage Project Name: Moloch Usage Description: Moloch Usage includes understanding packet with respect to system level components, GUI views of MOLOCH Packet Analytics and MOLOCH Use Case. Author: Rohit D Sadgune Summary of Content System Level Concepts of MOLOCH Important Files & Folders Working with MOLOCH USE cases of …