Critical Resources

  • Digital Forensics
    • Autopsy
      • SluethKit. (2023). About Autopsy. Retrieved on May 29, 2023 from https://www.sleuthkit.org/autopsy/
      • SluethKit. (2023). Timeline Mode. Timeline Analysis. Retrieved on May 29, 2023 from https://www.sleuthkit.org/autopsy/help/tl.html
    • Cellebrite
      • Mahalik, Heather. (2020). Deep Carving Inside SQLite to Find Deleted Data in the Database in Cellebrite Physical Analyzer. Cellebrite. Retrieved on June 4, 2023 from https://cellebrite.com/en/deep-carving-inside-sqlite-to-find-deleted-data-in-the-database-in-cellebrite-physical-analyzer/
      • Mahalik, Heather. (2022). How to View the Keychain Dump in Cellebrite Physical Analyzer. Cellebrite. Retrieved on June 4, 2023 from https://cellebrite.com/en/how-to-view-the-keychain-dump-in-cellebrite-physical-analyzer/
      • Watson, Ariel. (2018). How to Share, Review and Interpret Your Digital Evidence Discoveries with Cellebrite Reader. Cellebrite. Retrieved on June 4, 2023 from https://cellebrite.com/en/how-to-share-review-and-interpret-your-digital-evidence-discoveries-with-cellebrite-reader/
    • Forensic Toolkit (FTK) – court-cited digital investigations product.
    • EnCase Forensic – court-cited digital investigations product.
    • Comprehensive List of Forensic Toolkits
  • Security Tools
    • Wireshark
      • Wireshark. (2022). Capture Privileges. Platform-Specific information about capture privileges. Retrieved on February 26, 2023 from https://wiki.wireshark.org/CaptureSetup/CapturePrivileges#windows
    • Metasploit
      • Marquez, C. J. (2010). An analysis of the ids penetration tool: Metasploit. The InfoSec Writers Text Library, Dec, 9.
    • Nmap
  • Threat Intelligence
    • CrowdStrike
      • Baker, Kurt. (2023). What Is Cyber Threat Intelligence? CrowdStrike. Retrieved on June 29, 2023 from https://www.crowdstrike.com/cybersecurity-101/threat-intelligence/
    • Recorded Future
      • The Recorded Future Team. (2020). What Is Open Source Intelligence and How Is it Used? Retrieved on June 29, 2023 from https://www.recordedfuture.com/open-source-intelligence-definition
      • The Recorded Future Team. (2022). What is Threat Intelligence? Recorded Future. Retrieved on June 29, 2023 from https://www.recordedfuture.com/threat-intelligence
      • The Recorded Future Team. (2020). What the 6 Phases of the Threat Intelligence Lifecycle Mean for Your Team. Recorded Future. Retrieved on July 1, 2023 from https://www.recordedfuture.com/threat-intelligence-lifecycle-phases
    • Other Cyber Threat Intelligence Tools
      • Kenyon, Tilly. (2022). Top 10 cyber threat intelligence tools. Retrieved on July 6, 2023 from https://cybermagazine.com/operational-security/top-10-cyber-threat-intelligence-tools
      • Grey Noise – analyzes Internet background noise.
      • VirusTotal – analyzes files and URLs to detect malware and malicious content using antivirus engines and website scanners.
  • Legal & Regulatory 
  • Policy Compliance Scanning
  • Mapping Cybersecurity & Privacy Laws to Internationally Accepted Controls
  • ISO/IEC 27002 on Compliance Controls