This tutorial covers the process of imaging a hard drive that has already been removed from a system with FTK Imager and a write blocker. FTK Imager comes in two versions, one that is installed on a pc and one that can be used during incident response from a thumb drive. We will be using the installed version for this tutorial, but both look and function the same. I will cover the following key steps in the process:
So you want to be a Cyber Security Analyst…
Welcome
Welcome to our humble digital abode! This site is all about cyber security and the tools needed to make it happen so if you are or want to be a cyber security analyst this is a good resource. Cyber security has different meanings depending on who you are talking too, here we will be covering it from a technical practitioner perspective and not as much from the management perspective. With that said, we will try to categorize content into the following five categories:
Continue reading “So you want to be a Cyber Security Analyst…”