<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Books &#8211; Free &amp; Affordable DFIR, OSINT, &amp; Cybersecurity Training</title>
	<atom:link href="https://training.dfirdiva.com/listing-category/dfir-books/feed" rel="self" type="application/rss+xml" />
	<link>https://training.dfirdiva.com</link>
	<description>Free &#38; Affordable DFIR, OSINT, &#38; Cybersecurity Training</description>
	<lastBuildDate>Wed, 15 May 2024 21:57:20 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://training.dfirdiva.com/wp-content/uploads/2021/09/cropped-DFIRDivaLogoTwitterMultiBkg-32x32.png</url>
	<title>Books &#8211; Free &amp; Affordable DFIR, OSINT, &amp; Cybersecurity Training</title>
	<link>https://training.dfirdiva.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cloud Forensics Demystified (Ganesh Ramakrishnan &#038; Mansoor Haqanee)</title>
		<link>https://training.dfirdiva.com/listing/cloud-forensics-demystified-ganesh-ramakrishnan-mansoor-haqanee</link>
		
		<dc:creator><![CDATA[DFIR Diva]]></dc:creator>
		<pubDate>Wed, 15 May 2024 21:57:19 +0000</pubDate>
				<guid isPermaLink="false">https://training.dfirdiva.com/?post_type=job_listing&#038;p=2789</guid>

					<description><![CDATA[<p><img width="1200" height="630" src="https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" fetchpriority="high" srcset="https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR.png 1200w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-300x158.png 300w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-1024x538.png 1024w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-768x403.png 768w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-400x210.png 400w" sizes="(max-width: 1200px) 100vw, 1200px" /></p>Title: Cloud Forensics Demystified: Decoding Cloud Investigation Complexities for Digital Forensic Professionals Authors: Ganesh Ramakrishnan &#38; Mansoor Haqanee Publisher: Packt Where to Buy (links): Packt Amazon* Topics: Cloud Fundamentals Forensic Readiness: Tools, Techniques, and Preparation for Cloud Forensics DFIR Investigations – Logs in AWS, Azure, and GCP Cloud Productivity Suites (Microsoft 365 and Google Workspace)&#8230;]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignnone size-medium wp-image-2793" src="https://training.dfirdiva.com/wp-content/uploads/2024/05/CloudForensicsDemystified-243x300.jpg" alt="" width="243" height="300" srcset="https://training.dfirdiva.com/wp-content/uploads/2024/05/CloudForensicsDemystified-243x300.jpg 243w, https://training.dfirdiva.com/wp-content/uploads/2024/05/CloudForensicsDemystified-830x1024.jpg 830w, https://training.dfirdiva.com/wp-content/uploads/2024/05/CloudForensicsDemystified-768x947.jpg 768w, https://training.dfirdiva.com/wp-content/uploads/2024/05/CloudForensicsDemystified-1245x1536.jpg 1245w, https://training.dfirdiva.com/wp-content/uploads/2024/05/CloudForensicsDemystified-1661x2048.jpg 1661w, https://training.dfirdiva.com/wp-content/uploads/2024/05/CloudForensicsDemystified-162x200.jpg 162w, https://training.dfirdiva.com/wp-content/uploads/2024/05/CloudForensicsDemystified-400x493.jpg 400w" sizes="(max-width: 243px) 100vw, 243px" /></p>
<p><strong>Title</strong>: Cloud Forensics Demystified: Decoding Cloud Investigation Complexities for Digital Forensic Professionals</p>
<p><strong>Authors</strong>: Ganesh Ramakrishnan &amp; Mansoor Haqanee</p>
<p><strong>Publisher</strong>: Packt</p>
<p><strong>Where to Buy</strong> (links):</p>
<p><a href="https://www.packtpub.com/product/cloud-forensics-demystified/9781800564411">Packt</a></p>
<p><a href="https://amzn.to/3wIYuM0">Amazon</a>*</p>
<p><strong>Topics</strong>:</p>
<ul class=" eplus-wrapper eplus-styles-uid-53dec5">
<li class=" eplus-wrapper">Cloud Fundamentals</li>
<li class=" eplus-wrapper">Forensic Readiness: Tools, Techniques, and Preparation for Cloud Forensics</li>
<li class=" eplus-wrapper">DFIR Investigations – Logs in AWS, Azure, and GCP</li>
<li>Cloud Productivity Suites (Microsoft 365 and Google Workspace)</li>
<li class=" eplus-wrapper">Common Attack Vectors and TTPs</li>
<li class=" eplus-wrapper">Cloud Forensic Analysis – Responding to an Incident in the Cloud</li>
<li>The Digital Forensics and Incident Response Process</li>
<li>Tools and Techniques for Digital Forensic Investigations</li>
<li>Live Forensic Analysis and Threat Hunting</li>
<li>Network Forensics</li>
<li>Malware Investigations</li>
<li>Traditional Forensics vs Cloud Forensics</li>
<li>MITRE ATT&amp;CK Framework</li>
<li class=" eplus-wrapper">Cloud Evidence Acquisition (AWS, Azure, GCP)</li>
<li class=" eplus-wrapper">Analyzing Compromised Containers</li>
<li class=" eplus-wrapper">Analyzing Compromised Cloud Productivity Suites (Microsoft 365 and Google Workspace)</li>
</ul>
<hr />
<p>*DFIR Diva is an affiliate of Amazon and receives a small percentage of sales made through affiliate links that go toward keeping the site running.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Digital Forensics and Incident Response (Gerard Johansen)</title>
		<link>https://training.dfirdiva.com/listing/digital-forensics-and-incident-response-gerard-johansen</link>
		
		<dc:creator><![CDATA[DFIR Diva]]></dc:creator>
		<pubDate>Tue, 30 Apr 2024 05:18:35 +0000</pubDate>
				<guid isPermaLink="false">https://training.dfirdiva.com/?post_type=job_listing&#038;p=2775</guid>

					<description><![CDATA[<p><img width="1200" height="630" src="https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" srcset="https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR.png 1200w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-300x158.png 300w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-1024x538.png 1024w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-768x403.png 768w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-400x210.png 400w" sizes="(max-width: 1200px) 100vw, 1200px" /></p>Book Title: Digital Forensics and Incident Response Author: Gerard Johansen Where to Buy: Packt (Print &#38; eBook) Amazon* Topics: Understanding Incident Response Managing Cyber Incidents Fundamentals of Digital Forensics Investigative Methodology Evidence Acquisition Collecting Network Evidence Acquiring Host-Based Evidence Remove Evidence Collection Forensic Imaging Evidence Analysis Analyzing Network Evidence Analyzing System Memory Analyzing System Storage Analyzing&#8230;]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-2778" src="https://training.dfirdiva.com/wp-content/uploads/2024/04/DFIRGerardJ-243x300.jpg" alt="" width="243" height="300" srcset="https://training.dfirdiva.com/wp-content/uploads/2024/04/DFIRGerardJ-243x300.jpg 243w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DFIRGerardJ-830x1024.jpg 830w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DFIRGerardJ-768x947.jpg 768w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DFIRGerardJ-162x200.jpg 162w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DFIRGerardJ-400x493.jpg 400w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DFIRGerardJ.jpg 1216w" sizes="auto, (max-width: 243px) 100vw, 243px" /></p>
<p><strong>Book Title</strong>: <strong>Digital Forensics and Incident Response</strong></p>
<p><strong>Author</strong>: Gerard Johansen</p>
<p><strong>Where to Buy</strong>:</p>
<p><a href="https://www.packtpub.com/product/digital-forensics-and-incident-response-third-edition/9781803238678">Packt</a> (Print &amp; eBook)</p>
<p><a href="https://amzn.to/4b8IDoU">Amazon</a>*</p>
<p><strong>Topics:</strong></p>
<ul>
<li>Understanding Incident Response</li>
<li>Managing Cyber Incidents</li>
<li>Fundamentals of Digital Forensics</li>
<li>Investigative Methodology</li>
<li>Evidence Acquisition</li>
<li>Collecting Network Evidence</li>
<li>Acquiring Host-Based Evidence</li>
<li>Remove Evidence Collection</li>
<li>Forensic Imaging</li>
<li>Evidence Analysis</li>
<li>Analyzing Network Evidence</li>
<li>Analyzing System Memory</li>
<li>Analyzing System Storage</li>
<li>Analyzing Log Files</li>
<li>Writing the Incident Report</li>
<li>Ransomware Incident Response</li>
<li>Ransomware Preparation and Response</li>
<li>Ransomware Investigations</li>
<li>Threat Intelligence and Hunting</li>
<li>Malware Analysis for Incident Response</li>
<li>Leveraging Threat Intelligence</li>
<li>Threat Hunting</li>
</ul>
<hr />
<p>*As an Amazon Associate I earn from qualifying purchases. This helps with the cost of running this website.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Placing the Suspect Behind the Keyboard: DFIR Investigative Mindset (Brett Shavers)</title>
		<link>https://training.dfirdiva.com/listing/placing-the-suspect-behind-the-keyboard-dfir-investigative-mindset-brett-shavers</link>
		
		<dc:creator><![CDATA[DFIR Diva]]></dc:creator>
		<pubDate>Sun, 07 Apr 2024 22:06:31 +0000</pubDate>
				<guid isPermaLink="false">https://training.dfirdiva.com/?post_type=job_listing&#038;p=2741</guid>

					<description><![CDATA[<p><img width="1200" height="630" src="https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR.png 1200w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-300x158.png 300w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-1024x538.png 1024w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-768x403.png 768w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-400x210.png 400w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></p>Book Title: Placing the Suspect Behind the Keyboard: DFIR Investigative Mindset Author: Brett Shavers Book Website: Placing the Suspect Behind the Keyboard Where to Buy: Amazon* Chapters Include: Technical Skills Tech Prowess Knowledge Rules of Civil/Criminal Procedure Rules of Evidence Evidence is not only just evidence Does evidence prove or disprove theories? Self-Assessment Who are&#8230;]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-2752" src="https://training.dfirdiva.com/wp-content/uploads/2024/04/DFIRInvMindset-191x300.png" alt="" width="191" height="300" srcset="https://training.dfirdiva.com/wp-content/uploads/2024/04/DFIRInvMindset-191x300.png 191w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DFIRInvMindset-128x200.png 128w, https://training.dfirdiva.com/wp-content/uploads/2024/04/DFIRInvMindset.png 365w" sizes="auto, (max-width: 191px) 100vw, 191px" /></p>
<p><strong>Book Title</strong>: Placing the Suspect Behind the Keyboard: DFIR Investigative Mindset</p>
<p><strong>Author</strong>: Brett Shavers</p>
<p><strong>Book Website</strong>: <a href="https://www.suspectbehindthekeyboard.com/">Placing the Suspect Behind the Keyboard</a></p>
<p><strong>Where to Buy</strong>:</p>
<p><a href="https://amzn.to/3xlTXPA">Amazon</a>*</p>
<p><strong>Chapters Include</strong>:</p>
<ul>
<li>Technical Skills
<ul>
<li>Tech Prowess</li>
</ul>
</li>
<li>Knowledge
<ul>
<li>Rules of Civil/Criminal Procedure</li>
<li>Rules of Evidence</li>
<li>Evidence is not only just evidence</li>
<li>Does evidence prove or disprove theories?</li>
</ul>
</li>
<li>Self-Assessment
<ul>
<li>Who are you?</li>
<li>Curiosity</li>
<li>Your Identity</li>
<li>Other DFIR investigative traits</li>
<li>Your brain</li>
<li>Assessing your team</li>
<li>Self-assessment rating</li>
</ul>
</li>
<li>Senses
<ul>
<li>Perceptions &amp; perspectives</li>
<li>Seeing &amp; observing</li>
<li>Hearing &amp; listening</li>
</ul>
</li>
<li>Hacking Your Mind
<ul>
<li>Critical thinking</li>
<li>Creative thinking</li>
<li>Visual thinking</li>
<li>Additional thinking models</li>
<li>Critical reading</li>
<li>Logic and reasoning</li>
<li>Cognition and ignorance</li>
<li>Theories and hypothesis</li>
<li>Think</li>
<li>Bias</li>
<li>Fallacies and reasoning errors</li>
</ul>
</li>
<li>Tactics
<ul>
<li>Old school &amp; high tech</li>
<li>Checklists &amp; procedures</li>
<li>The Investigative Cycle(s)</li>
<li>Live Cycles, Kill Chains, &amp; Crime Scripting</li>
<li>Profiling</li>
<li>Identity</li>
<li>Link analysis</li>
<li>Notetaking</li>
<li>Problem-solving</li>
<li>Visualization to see the case</li>
</ul>
</li>
<li>Strategies
<ul>
<li>Micro and Macro</li>
<li>Decision-making</li>
<li>Focus and distractions</li>
<li>Correlation and causation</li>
<li>Targeting and pivoting</li>
<li>Errors and mistakes</li>
<li>Dumb ideas and terrible solutions</li>
<li>Words (and choice of words) matter</li>
</ul>
</li>
<li>Transformation
<ul>
<li>Scenario-based training</li>
<li>Visualization drills</li>
<li>Writing and speaking</li>
<li>Memory &amp; documentation</li>
<li>Case studies</li>
<li>Unconscious competence?</li>
<li>Shadowing</li>
<li>Daily life of a critical thinker</li>
<li>Peer review</li>
</ul>
</li>
<li>Wisdom
<ul>
<li>Know yourself &amp; seek self-improvement</li>
<li>Technical competence is your responsiblity</li>
<li>Hack your brain</li>
<li>Hack the adversary</li>
<li>Personal and professional accountability</li>
<li>Ethics and corruption</li>
<li>Credibility and reliability</li>
<li>Faults and competence</li>
<li>Pitfalls and self-made traps</li>
</ul>
</li>
<li>Education &amp; Training
<ul>
<li>You need both training and education in DFIR</li>
</ul>
</li>
<li>AI as the Investigator</li>
<li>Time to Liftoff
<ul>
<li>Obstacles to developing a DFIR Investigative Mindset</li>
</ul>
</li>
<li>Conclusion
<ul>
<li>My last bit of guidance for you</li>
</ul>
</li>
</ul>
<hr />
<p>*As an Amazon Associate I earn from qualifying purchases. This helps with the cost of running this website.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Effective Threat Investigation for SOC Analysts (Mostafa Yahia)</title>
		<link>https://training.dfirdiva.com/listing/effective-threat-investigation-for-soc-analysts-mostafa-yahia</link>
		
		<dc:creator><![CDATA[DFIR Diva]]></dc:creator>
		<pubDate>Wed, 03 Apr 2024 04:47:16 +0000</pubDate>
				<guid isPermaLink="false">https://training.dfirdiva.com/?post_type=job_listing&#038;p=2633</guid>

					<description><![CDATA[<p><img width="1200" height="630" src="https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR.png 1200w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-300x158.png 300w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-1024x538.png 1024w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-768x403.png 768w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-400x210.png 400w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></p>Book Title: Effective Threat Investigation for SOC Analysts Author: Mostafa Yahia Where to Buy: Packt (Print &#38; eBook) Amazon* Topics: Email Investigation Techniques Introduction to Windows Event Logs Tracking Accounts Login and Management Investigating Suspicious Process Execution Using Windows Event Logs Investigating PowerShell Event Logs Investigating Persistence and Lateral Movement Using Windows Event Logs Network&#8230;]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-2636" src="https://training.dfirdiva.com/wp-content/uploads/2024/04/EffectiveThreatInvBook-242x300.png" alt="" width="242" height="300" srcset="https://training.dfirdiva.com/wp-content/uploads/2024/04/EffectiveThreatInvBook-242x300.png 242w, https://training.dfirdiva.com/wp-content/uploads/2024/04/EffectiveThreatInvBook-161x200.png 161w, https://training.dfirdiva.com/wp-content/uploads/2024/04/EffectiveThreatInvBook-400x496.png 400w, https://training.dfirdiva.com/wp-content/uploads/2024/04/EffectiveThreatInvBook.png 602w" sizes="auto, (max-width: 242px) 100vw, 242px" /></p>
<p><strong>Book Title</strong>: <strong><a href="https://www.packtpub.com/product/effective-threat-investigation-for-soc-analysts/9781837634781">Effective Threat Investigation for SOC Analysts</a></strong></p>
<p><strong>Author</strong>: Mostafa Yahia</p>
<p><strong>Where to Buy</strong>:</p>
<p><a href="https://www.packtpub.com/product/effective-threat-investigation-for-soc-analysts/9781837634781">Packt</a> (Print &amp; eBook)</p>
<p><a href="https://amzn.to/49p0VAC">Amazon</a>*</p>
<p><strong>Topics:</strong></p>
<ul>
<li>Email Investigation Techniques</li>
<li>Introduction to Windows Event Logs</li>
<li>Tracking Accounts Login and Management</li>
<li>Investigating Suspicious Process Execution Using Windows Event Logs</li>
<li>Investigating PowerShell Event Logs</li>
<li>Investigating Persistence and Lateral Movement Using Windows Event Logs</li>
<li>Network Firewall Logs Analysis</li>
<li>Web Proxy Logs Analysis</li>
<li>Investigating Suspicious Outbound Communications (C&amp;C Communications) by Using Proxy Logs</li>
<li>Investigating External Threats</li>
<li>Investigating Network Flows and Security Solutions Alerts</li>
<li>Introduction to Threat Intelligence</li>
<li>Investigating Threats Using VirusTotal</li>
<li>Investigating Threats Using IBM X-Force Exchange</li>
<li>Malware Sandboxing &#8211; Building a Malware Sandbox</li>
<li>Hands-On Demo Lab</li>
</ul>
<hr />
<p>*As an Amazon Associate I earn from qualifying purchases. This helps with the cost of running this website.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Practical Linux Forensics: A Guide for Digital Investigators (Bruce Nikkel)</title>
		<link>https://training.dfirdiva.com/listing/practical-linux-forensics-a-guide-for-digital-investigators-bruce-nikkel</link>
		
		<dc:creator><![CDATA[DFIR Diva]]></dc:creator>
		<pubDate>Thu, 12 Oct 2023 17:19:07 +0000</pubDate>
				<guid isPermaLink="false">https://training.dfirdiva.com/?post_type=job_listing&#038;p=2045</guid>

					<description><![CDATA[<p><img width="1200" height="630" src="https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR.png 1200w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-300x158.png 300w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-1024x538.png 1024w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-768x403.png 768w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-400x210.png 400w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></p>Book Title: Practical Linux Forensics: A Guide for Digital Investigators Author: Bruce Nikkel Publisher: No Starch Press Where to Buy (links): No Starch Press (Print &#38; eBook) Amazon*  Topics: Digital Forensics Overview, Linux Overview, Evidence from Storage Devices and Filesystems, Directory Layout and Forensic Analysis of Linux Files, Investigating Evidence from Linux Logs, Reconstructing System&#8230;]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-2048" src="https://training.dfirdiva.com/wp-content/uploads/2023/10/PracticalLinuxForensics-227x300.png" alt="" width="227" height="300" srcset="https://training.dfirdiva.com/wp-content/uploads/2023/10/PracticalLinuxForensics-227x300.png 227w, https://training.dfirdiva.com/wp-content/uploads/2023/10/PracticalLinuxForensics-400x528.png 400w, https://training.dfirdiva.com/wp-content/uploads/2023/10/PracticalLinuxForensics.png 477w" sizes="auto, (max-width: 227px) 100vw, 227px" /></p>
<p><strong>Book Title</strong>: Practical Linux Forensics: A Guide for Digital Investigators</p>
<p><strong>Author:</strong> Bruce Nikkel</p>
<p><strong>Publisher</strong>: No Starch Press</p>
<p><strong>Where to Buy (links):</strong></p>
<p><a href="https://nostarch.com/practical-linux-forensics">No Starch Press (Print &amp; eBook)</a></p>
<p><a href="https://amzn.to/3tv13j0">Amazon* </a></p>
<p><strong>Topics: </strong>Digital Forensics Overview, Linux Overview, Evidence from Storage Devices and Filesystems, Directory Layout and Forensic Analysis of Linux Files, Investigating Evidence from Linux Logs, Reconstructing System Boot and Initialization, Examination of Installed Software Packages, Identifying Network Configuration Artifacts, Forensic Analysis of Time and Location, Reconstructing User Desktops and Login Activity, Forensic Traces of Attached Peripheral Devices</p>
<p>*As an Amazon associate, I earn from qualifying purchases. This helps with the cost of running this website.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>EZ Tools Manuals (Andrew Rathbun &#038; Eric Zimmerman)</title>
		<link>https://training.dfirdiva.com/listing/ez-tools-manuals-andrew-rathbun-eric-zimmerman</link>
		
		<dc:creator><![CDATA[DFIR Diva]]></dc:creator>
		<pubDate>Wed, 09 Nov 2022 01:38:05 +0000</pubDate>
				<guid isPermaLink="false">https://training.dfirdiva.com/?post_type=job_listing&#038;p=1799</guid>

					<description><![CDATA[<p><img width="1200" height="630" src="https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR.png 1200w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-300x158.png 300w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-1024x538.png 1024w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-768x403.png 768w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-400x210.png 400w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></p>Name and Direct Link (LeanPub): EZ Tools Manuals Cost: Pay what you want, including Free Topics: Eric Zimmerman&#8217;s Tools, AmcacheParser, AppCompatCacheParser, bstrings, EvtxECmd, IISGeoLocate, JLECmd, LECmd, MFTECmd, PECmd, RBCmd, RecentFileCacheParser, RECmd, RLA, SBECmd, SQLECmd, SrumCmd, SumECmd, VSCMount, WxTCmd, EZ Tools GUI, EZViewer, JumpList Explorer, Registry Explorer, Shellbags Explorer, Timeline Explorer]]></description>
										<content:encoded><![CDATA[<p><img width="1200" height="630" src="https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR.png 1200w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-300x158.png 300w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-1024x538.png 1024w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-768x403.png 768w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-400x210.png 400w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></p><p><strong>Name and Direct Link</strong> <strong>(LeanPub): <a href="https://leanpub.com/eztoolsmanuals">EZ Tools Manuals</a></strong></p>
<p><strong>Cost</strong>: Pay what you want, including Free</p>
<p><strong>Topics</strong>: Eric Zimmerman&#8217;s Tools, AmcacheParser, AppCompatCacheParser, bstrings, EvtxECmd, IISGeoLocate, JLECmd, LECmd, MFTECmd, PECmd, RBCmd, RecentFileCacheParser, RECmd, RLA, SBECmd, SQLECmd, SrumCmd, SumECmd, VSCMount, WxTCmd, EZ Tools GUI, EZViewer, JumpList Explorer, Registry Explorer, Shellbags Explorer, Timeline Explorer</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Hitchhiker&#8217;s Guide to DFIR: Experiences from Beginners to Experts (Members of the Digital Forensics Discord Server)</title>
		<link>https://training.dfirdiva.com/listing/the-hitchhikers-guide-to-dfir-experiences-from-beginners-to-experts-members-of-the-digital-forensics-discord-server</link>
		
		<dc:creator><![CDATA[DFIR Diva]]></dc:creator>
		<pubDate>Tue, 16 Aug 2022 00:27:55 +0000</pubDate>
				<guid isPermaLink="false">https://training.dfirdiva.com/?post_type=job_listing&#038;p=1559</guid>

					<description><![CDATA[<p><img width="1200" height="630" src="https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR.png 1200w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-300x158.png 300w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-1024x538.png 1024w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-768x403.png 768w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-400x210.png 400w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></p>Name &#38; Direct Link (LeanPub): The Hitchhiker&#8217;s Guide to DFIR: Experiences From Beginners and Experts Topics: Digital Forensics Discord Server, Malware Analysis, Password Cracking for Beginners, Android Application Analysis, De-Obfuscating PowerShell Payloads, CTFs, Law Enforcement Digital Forensics Laboratory, Artifacts as Evidence, Forensic Imaging in a Nutshell, Linux and Digital Forensics Learn More About and Join&#8230;]]></description>
										<content:encoded><![CDATA[<p><img width="1200" height="630" src="https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR.png 1200w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-300x158.png 300w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-1024x538.png 1024w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-768x403.png 768w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-400x210.png 400w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></p><p><strong>Name &amp; Direct Link (LeanPub)</strong>: <a href="https://leanpub.com/TheHitchhikersGuidetoDFIRExperiencesFromBeginnersandExperts"><strong>The Hitchhiker&#8217;s Guide to DFIR: Experiences From Beginners and Experts</strong></a></p>
<p><strong>Topics</strong>: Digital Forensics Discord Server, Malware Analysis, Password Cracking for Beginners, Android Application Analysis, De-Obfuscating PowerShell Payloads, CTFs, Law Enforcement Digital Forensics Laboratory, Artifacts as Evidence, Forensic Imaging in a Nutshell, Linux and Digital Forensics</p>
<p><strong>Learn More About and Join the Discord Server Here</strong>: <a href="https://aboutdfir.com/a-beginners-guide-to-the-digital-forensics-discord-server/">A Beginner&#8217;s Guide to the Digital Forensics Discord Server</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>PowerShell and Python Together: Targeting Digital Investigations (Chet Hosmer)</title>
		<link>https://training.dfirdiva.com/listing/powershell-and-python-together-targeting-digital-investigations-chet-hosmer</link>
		
		<dc:creator><![CDATA[DFIR Diva]]></dc:creator>
		<pubDate>Thu, 21 Oct 2021 07:25:16 +0000</pubDate>
				<guid isPermaLink="false">https://training.dfirdiva.com/?post_type=job_listing&#038;p=1281</guid>

					<description><![CDATA[<p><img width="1200" height="630" src="https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR.png 1200w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-300x158.png 300w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-1024x538.png 1024w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-768x403.png 768w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-400x210.png 400w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></p>Book Title: PowerShell and Python Together Targeting Digital Investigations Author: Chet Hosmer Publisher: Apress Where to Buy (link): Apress/Springer Books (Print &#38; eBook) Amazon* Topics: PowerShell for Investigators, Navigating PowerShell ISE, PowerShell CmdLets, PowerShell Pipelining, PowerShell Scripting Targeting Investigation, EventProcessor PowerShell Script, Remote Access, USB Device Usage Discovery, Python and Live Acquisition, Directing PowerShell with&#8230;]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-1283" src="https://training.dfirdiva.com/wp-content/uploads/2021/10/PowerShellandPython.jpg" alt="" width="153" height="232" /></p>
<p><strong>Book Title</strong>: PowerShell and Python Together Targeting Digital Investigations</p>
<p><strong>Author:</strong> Chet Hosmer</p>
<p><strong>Publisher:</strong> Apress</p>
<p><strong>Where to Buy (link):</strong></p>
<p><a href="https://link.springer.com/book/10.1007/978-1-4842-4504-0">Apress/Springer Books</a> (Print &amp; eBook)</p>
<p><a href="https://amzn.to/3OimcDr">Amazon*</a></p>
<p><strong>Topics</strong>: PowerShell for Investigators, Navigating PowerShell ISE, PowerShell CmdLets, PowerShell Pipelining, PowerShell Scripting Targeting Investigation, EventProcessor PowerShell Script, Remote Access, USB Device Usage Discovery, Python and Live Acquisition, Directing PowerShell with Python, Gathering and Analyzing Remote Evidence, Extracting Names from Text Documents, Extracting EXIF Data from Photographs</p>
<p>*As an Amazon Associate I earn from qualifying purchases. This helps with the cost of running this website.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Malware Analysis and Detection Engineering (Abhijit Mohanta and Anoop Saldanha)</title>
		<link>https://training.dfirdiva.com/listing/malware-analysis-and-detection-engineering-abhijit-mohanta-and-anoop-saldanha</link>
		
		<dc:creator><![CDATA[DFIR Diva]]></dc:creator>
		<pubDate>Thu, 21 Oct 2021 07:13:00 +0000</pubDate>
				<guid isPermaLink="false">https://training.dfirdiva.com/?post_type=job_listing&#038;p=1278</guid>

					<description><![CDATA[<p><img width="1731" height="1155" src="https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleMain.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleMain.png 1731w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleMain-300x200.png 300w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleMain-1024x683.png 1024w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleMain-768x512.png 768w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleMain-1536x1025.png 1536w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleMain-400x267.png 400w" sizes="auto, (max-width: 1731px) 100vw, 1731px" /></p>Book Title: Malware Analysis and Detection Engineering Authors: Abhijit Mohanta and Anoop Saldanha Publisher: Apress Where to Buy (links): Apress/Springer Books (Print &#38; eBook) Amazon* Topics: Malware Analysis Lab Setup, Files and File Formats, Virtual Memory and the Portable Exececutable (PE) File, Windows Internals, Malware Components, Persistence Mechanisms, Network Communication, Code Injection, Process Hollowing, API&#8230;]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-1280" src="https://training.dfirdiva.com/wp-content/uploads/2021/10/MalwareAnalysisandDE.jpg" alt="" width="153" height="218" /></p>
<p><strong>Book Title</strong>: Malware Analysis and Detection Engineering</p>
<p><strong>Authors</strong>: Abhijit Mohanta and Anoop Saldanha</p>
<p><strong>Publisher:</strong> Apress</p>
<p><strong>Where to Buy (links)</strong>:</p>
<p><a href="https://link.springer.com/book/10.1007/978-1-4842-6193-4">Apress/Springer Books</a> (Print &amp; eBook)</p>
<p><a href="https://amzn.to/3hZd0I1">Amazon*</a></p>
<p><strong>Topics</strong>: Malware Analysis Lab Setup, Files and File Formats, Virtual Memory and the Portable Exececutable (PE) File, Windows Internals, Malware Components, Persistence Mechanisms, Network Communication, Code Injection, Process Hollowing, API Hooking, Stealth and Rootkits, Static Analysis, Dynamic Analysis, Memory Forensics with Volatility, Payload Dissection and Classification, Debuggers and Assembly Language, Debugging Code Injection, Armoring and Evasion, Antivirus Engines, IDS/IPS and Snort/Suricata Rule Writing, Malware Sandbox Internals, Binary Instrumentation for Reversing Automation</p>
<p>*DFIR Diva is an affiliate of Amazon and receives a small percentage of sales made through affiliate links that go toward keeping the site running.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Learning Malware Analysis (Monnappa K A)</title>
		<link>https://training.dfirdiva.com/listing/learning-malware-analysis-monnappa-k-a</link>
		
		<dc:creator><![CDATA[DFIR Diva]]></dc:creator>
		<pubDate>Thu, 21 Oct 2021 00:58:20 +0000</pubDate>
				<guid isPermaLink="false">https://training.dfirdiva.com/?post_type=job_listing&#038;p=1272</guid>

					<description><![CDATA[<p><img width="1200" height="630" src="https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR.png 1200w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-300x158.png 300w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-1024x538.png 1024w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-768x403.png 768w, https://training.dfirdiva.com/wp-content/uploads/2021/09/PurpleDFIR-400x210.png 400w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></p>Book Title: Learning Malware Analysis Author: Monnappa K A Publisher: Packt Where to Buy (link): Packt (Print &#38; eBook) Amazon Topics: Types of Malware Analysis, Setting Up the Lab Environment, Malware Sources, Statis Analysis, Determining File Type, Fingerprinting Malware, Extracting Strings, Determining File Obfuscation, Inspecting PE Header Information, Comparing and Classifying the Malware, Dynamic Analysis,&#8230;]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-1274" src="https://training.dfirdiva.com/wp-content/uploads/2021/10/LearningMalwareAnalysis-243x300.png" alt="" width="243" height="300" srcset="https://training.dfirdiva.com/wp-content/uploads/2021/10/LearningMalwareAnalysis-243x300.png 243w, https://training.dfirdiva.com/wp-content/uploads/2021/10/LearningMalwareAnalysis.png 250w" sizes="auto, (max-width: 243px) 100vw, 243px" /></p>
<p><strong>Book Title</strong>: Learning Malware Analysis</p>
<p><strong>Author</strong>: Monnappa K A</p>
<p><strong>Publisher</strong>: Packt</p>
<p><strong>Where to Buy (link):</strong></p>
<p><a href="https://www.packtpub.com/product/learning-malware-analysis/9781788392501" target="_blank" rel="noopener">Packt (Print &amp; eBook)</a></p>
<p><a href="https://amzn.to/3GvF8g7">Amazon</a></p>
<p><strong>Topics</strong>: Types of Malware Analysis, Setting Up the Lab Environment, Malware Sources, Statis Analysis, Determining File Type, Fingerprinting Malware, Extracting Strings, Determining File Obfuscation, Inspecting PE Header Information, Comparing and Classifying the Malware, Dynamic Analysis, System and Network Monitoring, Dynamic-Link Library (DLL) Analysis, Computer Basics, CPU Registers, Data Transfer Instructions, Arithmetic Operations, Bitwise Operations, Assembly and Disassembly, x64 Architecture, IDA, x64dbg, Debugging a .NET Application, Malware Persistance Methods, User Mode, Kernel Mode, Code Injection Techniques, Hooking Techniques, Obfuscation Techniques, Encryption, Unpacking, Hunting Malware Using Memory Forensics, Volatility, Detecting API Hooks, Kernel Mode Rootkits</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
