Course Description
This course provides an overview of incident response & computer forensics. Topics include everything from establishing policies and procedures to hands-on experience collecting data from live Windows machines. Several hands-on exercises utilizing various Forensics tools will be incorporated into the course to allow you to perform live forensic analysis on the operating system. Tools include various forensic filesystem analysis methods, memory analysis tools, and network protocol analytics, as well as an opportunity to put what you've learned to the test in a simulated compromise.
Information Security, Incident Response and Computer Forensics Dec 2025Information Security, Incident Response and Computer Forensics
Real-World Incidents
Case Studies
Attack Lifecycle Phases
Incident Response ProcessIncident Response PolicyWhat is an Incident?Incident Response GoalsNIST Incident Response Process
Incident Response Policy
What is an Incident?
Incident Response Goals
NIST Incident Response Process
Preparing for an IncidentPre-Incident Activities
Pre-Incident Activities
Data CollectionLive Data Collection
Live Data Collection
Evidence HandlingEvidenceChan of CustodyEvidence Integrity
Evidence
Chan of Custody
Evidence Integrity
Network EvidenceNetwork-based EvidenceGoals of Network MonitoringTypes of Network MonitoringWireshark and Other Tools
Network-based Evidence
Goals of Network Monitoring
Types of Network Monitoring
Wireshark and Other Tools
Memory EvidenceMemory ForensicsMemory AcquisitionRedlineMemory Analysis to Find EvilZeusStuxnetStorm Worm RootkitTDSS Rootkit
Memory Forensics
Memory Acquisition
Redline
Memory Analysis to Find EvilZeusStuxnetStorm Worm RootkitTDSS Rootkit
Zeus
Stuxnet
Storm Worm Rootkit
TDSS Rootkit
RemediationRemediation WorkflowRemediation OwnerRemediation Actions
Remediation Workflow
Remediation Owner
Remediation Actions
Putting it All Together
Related Certificates
Earning a Saint Louis University Workforce Center certificate allows you to enhance your career options by networking with peers and establishing valuable industry contacts.
ISACA Professional Certificate
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud.
See Details
Artificial Intelligence and Large Language Models Foundations
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud.
See Details
Artificial Intelligence and Machine Learning for Cybersecurity Operations
Artificial intelligence (AI) and machine learning (ML) are revolutionizing the cybersecurity industry. The emergence of ML as a tool for...
See Details