Blog
Cyber Security Lifecycle
Cyber Threat
1

Cyber Security Lifecycle

Cyber Security Lifecycle Project Name: Cyber Security Lifecycle Description: Without applying a Lifecycle mechanism to a cyber security in any organization there arises an increased risk of cyber threats affecting the system. A systematic approach in any organization delivers and resist the cyber-attacks, persistent threats to a great extent. The cyber …

Read More
Types of System Software
Cyber Threat

Types of System Software

Types of System Software Project Name: Types of System Software Description: This blog will help to understand Types of System Software Author: Rohit D Sadgune / Amruta Sadgune Frequently Asked Question on Types of System Software What are different types of system software? What are the different types of software? …

Read More
cyber security controls india
Cyber Threat
1

Cyber Security Control

Cyber Security Control Project Name: Cyber Security Control Description: Cyber Security Control India blog will help each IT employee to understand information environment in better way. The components of Cyber Security Controls Author: Rohit D Sadgune Summary of Content Components Of Cyber Security Controls Basic Requirement of Cyber Security Controls …

Read More
Packet Analytics
Packet Forensics and Analytics

Packet Analytics

Packet Analytics Project Name: Packet Analytics Description: Packet Analytics includes understanding Packet. Both will perform this activity in Real Time so as to resolve many issues like DOS attack, DDOS Attack, Insider Threats, Access Intelligence, Bandwidth Issue and many more. Author: Rohit D Sadgune Frequently Asked Question on MOLOCH Packet …

Read More
Digital Evedance
Packet Forensics and Analytics

Moloch Packet Analytics

Moloch Packet Analytics Project Name:  Moloch Packet Analytics Description: Moloch Packet Analytics includes understanding MOLOCH and Elasticsearch to a great extent. Packet Forensics and Analytics will help you to understand MOLOCH for Packet Analytics & Elasticsearch for forensics indexing for packet. Both will perform this activity in Real Time so …

Read More
Live Evidence Invetigation
Packet Forensics and Analytics

Installation of MOLOCH

Installation of MOLOCH Project Name: Installation of MOLOCH Description: Packet Analytics includes understanding MOLOCH and Elasticsearch to great extent. In this blog we will try to figure out step by step installation of MOLOCH for Packet Analytics & Packet Forensics. Packet Forensics and Analytics will help you understand MOLOCH for …

Read More
MOLOCH Usage
Packet Forensics and Analytics

Moloch Usage

Moloch Usage Project Name: Moloch Usage Description: Moloch Usage includes understanding packet with respect to system level components, GUI views of MOLOCH Packet Analytics and MOLOCH Use Case. Author: Rohit D Sadgune Summary of Content System Level Concepts of MOLOCH Important Files & Folders Working with MOLOCH USE cases of …

Read More
File Forensics
General

How to investigate files

How to investigate files Project Name: How to investigate files Description:How to investigate files includes understanding of file system and there features, attributes. The new file system forensic analysis includes all new features security aspects of operating systems. Author: Rohit D Sadgune Summary of Content                      1.      FAT 2.      FAT32 3.      …

Read More
Live Evidence Investigation
ProDiscover

Live Evidence Investigation

  Live Evidence Investigation Project Name: Live Evidence Investigation Description: Live Evidence Investigation is a very difficult level of sophisticated job. In this blog we will try to understand step by step guide to concepts of Live Evidence Investigation. Author: Rohit D Sadgune Summary of Contents ·         RAM Forensics Basic …

Read More
Server Hacked
Linux Server Investigation

Compromised Linux Server Investigation

Compromised Linux Server Investigation Project Name: Compromised Linux Server Investigation Description: Compromised Linux Server Investigation in India is a very precise level of sophisticated job. In this blog we will try yo understand step by step guide to Linux server forensics investigation & incident response. In term of Compromised Linux Server …

Read More
prodiscover forensics
ProDiscover

How to use ProDiscover

How to use ProDiscover   Project Name: How to use ProDiscover Description: Step by step guide to How to use ProDiscover Incident Response customization Author: Rohit D Sadgune Summary of Contents In this blog we will learn following things How to start prodiscover incident response How to use ProDiscover Project …

Read More
Advance Data Recovery
Data Recovery

Advance Data Recovery

Advance Data Recovery 1.    Chances for Data Recovery of Deleted files 2.    Chances for Data Recovery of Formatted File Systems   Chances for Data Recovery of Deleted files Windows file systems Famous Windows file systems which includes FAT (with FAT32 extension), NTFS and newly produced file system ReFS for Windows …

Read More
Data Recovery Concept
Data Recovery

Data Recovery Concept

Data Recovery Concept   Data Recovery Concepts deal with following things What is data Loss Common Computer Problems Data Analysis Concepts Data Recovery Tips Data Recovery Technique Basic Data Recovery Advance Data Recovery Data Recovery is the process of extracting digital information in the form of data from damaged, failed, …

Read More
Data Recovery Basic
Data Recovery

Basic Data Recovery

Project Name: Basic Data Recovery Description: Basic Data Recovery will help all digital forensics investigator to perform perform data recovery. Author: Rohit D Sadgune Summary of Content Basic Data Recovery File System Recovery Phases of basic data recovery Data Recovery is the process of extracting digital information in form of …

Read More
Fraud Invetigation
General

Fraud Investigation Concept

fraud investigation concept

Read More
Forensics Analysis
Digital Forensics

Forensics Analysis in India

Forensics Analysis in India Computer Forensics: – Computer forensics is the scientific examination and analysis of data held on, or retrieved from, degital storage media in such a way that the information can be used as evidence in a court of law to conclude suspect to culprit.  The Computer Forensic …

Read More
ProDiscover

ProDiscover Incident Response Project

ProDiscover Incident Response Project   Project Name: ProDiscover Incident Response Project Description: Step by step guide to ProDiscover Incident Response Author: Rohit D Sadgune Summary of Contents In this blog we will learn following things how to start prodiscover incident response Project number & case files Adding suspected evidence drive …

Read More
Digital Evidence India
Digital Forensics
1

Digital Evidence India

Digital Evidence India Types of digital evidence India Digital Evidence India The Court and Rule of Evidence – Digital Evidence  Rules of Procedure (Data compaction, Data Duplication/Authentication by Expert Data Compilation Information Discoverable Verification/validation, Standard followed Digital Forensic Science tool, technique, Approach, analysis and Process the digital evidence These evidence …

Read More
Computer Forensics Fundamentals
General
1

Forensics Incident Response

The Document Describes The Forensics Incident Response Checklist For Incident Management Developing a Computer Security Incident Response Define your organization’s overall incident response structure. Develop and implement alert mechanisms that permit quick action. Establish a centralized reporting structure. Appoint and train incident response personnel. Recognizing Signs of an Intrusion Observe your …

Read More
Computer and Network Log Analytics
Cyber Threat

Computer and Network Log Analytics

Computer and Network Log Analytics Project Name: Computer and Network Log Analytics Description: This blog will help you to understand Computer and Network Log Analytics. Security Logs Category, Operating System Logs Analysis, Application Logs, Security Software Logs Analysis, Router Log Files Analysis, Linux Process Account Analysis, Windows Log Files Analysis Author: …

Read More
Cyber Threat Analytics
Digital Forensics

Reconstructing Past Digital Events

Reconstructing Past Digital Events Project Name: Reconstruction of Past Digital Events Description: This blog will help all forensics investigator to Reconstruct of Past Digital Events. Author: Rohit D Sadgune Frequently Asked Question on Computer Forensics Investigation How to Reconstructing Past Digital Event Backup of Digital Events Importanance of Reconstructing Past …

Read More
ProDiscover

How to recover Master File Table

How to recover Master File Table

Read More
Computer Forensics Fundamentals
Digital Forensics

Computer Forensics Fundamentals

Computer Forensics Fundamentals Project Name: Computer Forensics Fundamentals Description: This blog will help all forensics investigator for Computer Forensics Fundamentals Author: Rohit D Sadgune Frequently Asked Question on Computer Forensics Investigation Checklist of Computer Forensics Fundamentals   Protect the suspected digital media during the forensic examination from any possible alteration, …

Read More
Principal Computer Forensic Activities Checklist Form
Digital Forensics
1

Digital Forensic Checklist

Digital Forensic Checklist Project Name: Digital Forensic Checklist Description: This blog will help all forensics investigator for Digital Forensic Checklist Author: Rohit D Sadgune Frequently Asked Question on Computer Forensics Investigation Checklist of Principal Digital Forensic Activities Checklist Form   Safely seize computer systems and files to avoid contamination and/or interference. …

Read More
Types of Computer Forensics Technology
Digital Forensics

Types of Computer Forensics Technology

Types of Computer Forensics Technology Project Name: Types of Computer Forensics Technology Description: This blog will help all forensics investigator for Types of Computer Forensics Technology Author: Rohit D Sadgune Frequently Asked Question on Computer Forensics Investigation Checklist of Types of Computer Forensics Technology   Move documentary evidence quickly from …

Read More
Digital Forensics

Types of Computer Forensics Systems

Types of Computer Forensics Systems Project Name: Types of Computer Forensics Systems Description: This blog will help all forensics investigator for Types of Computer Forensics Systems Author: Rohit D Sadgune Frequently Asked Question on Computer Forensics Investigation Checklist of Types of Computer Forensics Systems Have procedures in place to establish …

Read More
Vendor and Computer Forensics Services
Digital Forensics

Vendor and Computer Forensics Services

Vendor and Computer Forensics Services Project Name: Vendor and Computer Forensics Services Description: This blog will help all forensics investigator for Evidence Collection and Data Seizure Author: Rohit D Sadgune Frequently Asked Question on Computer Forensics Investigation Checklist of Vendor and Computer Forensics Services   Make sure your computer forensics …

Read More
Cyber Threat Analytics
Digital Forensics
Reconstructing Past Digital Events

Reconstructing Past Digital Events Project Name: Reconstruction of Past Digital Events Description: This blog will help all forensics investigator to Reconstruct of Past Digital Events. Author: Rohit D Sadgune Frequently Asked Question on Computer Forensics Investigation How to Reconstructing Past Digital Event Backup of Digital Events Importanance of Reconstructing Past …

Computer Forensics Fundamentals
Digital Forensics
Computer Forensics Fundamentals

Computer Forensics Fundamentals Project Name: Computer Forensics Fundamentals Description: This blog will help all forensics investigator for Computer Forensics Fundamentals Author: Rohit D Sadgune Frequently Asked Question on Computer Forensics Investigation Checklist of Computer Forensics Fundamentals   Protect the suspected digital media during the forensic examination from any possible alteration, …

Principal Computer Forensic Activities Checklist Form
Digital Forensics
1
Digital Forensic Checklist

Digital Forensic Checklist Project Name: Digital Forensic Checklist Description: This blog will help all forensics investigator for Digital Forensic Checklist Author: Rohit D Sadgune Frequently Asked Question on Computer Forensics Investigation Checklist of Principal Digital Forensic Activities Checklist Form   Safely seize computer systems and files to avoid contamination and/or interference. …

Types of Computer Forensics Technology
Digital Forensics
Types of Computer Forensics Technology

Types of Computer Forensics Technology Project Name: Types of Computer Forensics Technology Description: This blog will help all forensics investigator for Types of Computer Forensics Technology Author: Rohit D Sadgune Frequently Asked Question on Computer Forensics Investigation Checklist of Types of Computer Forensics Technology   Move documentary evidence quickly from …

Digital Forensics
Types of Computer Forensics Systems

Types of Computer Forensics Systems Project Name: Types of Computer Forensics Systems Description: This blog will help all forensics investigator for Types of Computer Forensics Systems Author: Rohit D Sadgune Frequently Asked Question on Computer Forensics Investigation Checklist of Types of Computer Forensics Systems Have procedures in place to establish …

Vendor and Computer Forensics Services
Digital Forensics
Vendor and Computer Forensics Services

Vendor and Computer Forensics Services Project Name: Vendor and Computer Forensics Services Description: This blog will help all forensics investigator for Evidence Collection and Data Seizure Author: Rohit D Sadgune Frequently Asked Question on Computer Forensics Investigation Checklist of Vendor and Computer Forensics Services   Make sure your computer forensics …

Computer Forensics Evidence And Capture Data Recovery
Digital Forensics
Computer Forensics Evidence And Capture Data Recovery

Computer Forensics Evidence And Capture Data Recovery Project Name: Computer Forensics Evidence And Capture Data Recovery Description: This blog will help all forensics investigator for Evidence Collection and Data Seizure Author: Rohit D Sadgune Frequently Asked Question on Computer Forensics Investigation Checklist of Computer Forensics Evidence And Capture Data Recovery …

Digital Evidence Collection and Data Seizure
Digital Forensics
Digital Evidence Collection and Data Seizure

Digital Evidence Collection and Data Seizure Project Name: Digital Evidence Collection and Data Seizure Description: This blog will help all forensics investigator for Digital Evidence Collection and Data Seizure Author: Rohit D Sadgune Frequently Asked Question on Computer Forensics Investigation Checklist of Digital Evidence Collection and Data Seizure   Make …

Duplication and Preservation of Digital Evidence
Digital Forensics
Duplication and Preservation of Digital Evidence

Duplication and Preservation of Digital Evidence Project Name: Duplication and Preservation of Digital Evidence Description: This blog will help all forensics investigator for Duplication and Preservation of Digital Evidence Author: Rohit D Sadgune Frequently Asked Question on Computer Forensics Investigation Checklist of Duplication and Preservation of Digital Evidence   Shut …

Computer Image Verification and Authentication
Digital Forensics
Computer Image Verification and Authentication

Computer Image Verification and Authentication Project Name: Computer Image Verification and Authentication Description: This blog will help all forensics investigator for Computer Image Verification and Authentication Author: Rohit D Sadgune Frequently Asked Question on Computer Forensics Investigation Checklist of Computer Image Verification and Authentication Alter the data on the cartridge. …

Cyber Security Lifecycle
Cyber Threat
1

Cyber Security Lifecycle

Cyber Security Lifecycle Project Name: Cyber Security Lifecycle Description: Without applying a Lifecycle mechanism to a cyber security in any organization there arises an increased risk of cyber threats affecting the system. A systematic approach in any organization delivers and resist the cyber-attacks, persistent threats to a great extent. The cyber …

Types of System Software
Cyber Threat

Types of System Software

Types of System Software Project Name: Types of System Software Description: This blog will help to understand Types of System Software Author: Rohit D Sadgune / Amruta Sadgune Frequently Asked Question on Types of System Software What are different types of system software? What are the different types of software? …

cyber security controls india
Cyber Threat
1

Cyber Security Control

Cyber Security Control Project Name: Cyber Security Control Description: Cyber Security Control India blog will help each IT employee to understand information environment in better way. The components of Cyber Security Controls Author: Rohit D Sadgune Summary of Content Components Of Cyber Security Controls Basic Requirement of Cyber Security Controls …

Computer and Network Log Analytics
Cyber Threat

Computer and Network Log Analytics

Computer and Network Log Analytics Project Name: Computer and Network Log Analytics Description: This blog will help you to understand Computer and Network Log Analytics. Security Logs Category, Operating System Logs Analysis, Application Logs, Security Software Logs Analysis, Router Log Files Analysis, Linux Process Account Analysis, Windows Log Files Analysis Author: …