
Episode 9: Breaking into DFIR: How to Get Started in Digital Forensics
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.
Add to Cart failed.
Por favor prueba de nuevo más tarde
Error al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tarde
Error al eliminar de la lista de deseos.
Por favor prueba de nuevo más tarde
Error al añadir a tu biblioteca
Por favor intenta de nuevo
Error al seguir el podcast
Intenta nuevamente
Error al dejar de seguir el podcast
Intenta nuevamente
-
Narrado por:
-
De:
Acerca de esta escucha
Welcome back to the Truth in Data podcast! In this episode, Jessica, Kim, and Debbie dive deep into the number one question they receive: "How do I break into Digital Forensics and Incident Response (DFIR)?"
If you're an aspiring digital forensics professional, a student planning your studies, someone considering a career change, or even an experienced investigator looking to expand your skills, this video is for you! We share our candid insights, practical advice, and a structured framework to help you navigate your entry into this dynamic field.
Key Resources & Tools Mentioned:
- Hexordia Blog Post: "Pathway to Digital Forensics" by Jessica Hyde - https://www.hexordia.com/blog/pathway-to-digital-forensics
- DFIR Diva: https://dfirdiva.com/
- Hexordia Free Courses: https://jessicalhyde.graphy.com/
- Cyber 5W Free Courses: https://cyber5w.com/
- Forensics Tools Examples: Autopsy, X-Ways, Cellebrite, Axiom, GrayKey, MSAB.
- Certifications Discussed: CompTIA A+, CompTIA Network+, CompTIA Security+
- "This Week in Forensics" by Phil Moore: https://thisweekin4n6.com/author/randomaccess3/
- Digital Forensics Discord Server
- Organizations: HTCIA, IASIS, WiCS (Women in Cybersecurity).
- Certifications Discussed: CompTIA A+, CompTIA Network+, CompTIA Security+.
- Forensics Tools Examples: Autopsy, X-Ways, Cellebrite, Axiom, GrayKey, MSAB
- Programming Languages: Python, C-sharp, PowerShell.
Todavía no hay opiniones