With an ever increasing number of crimes with a cyber component, the need for investigators who have been trained the ways of the Internet, encryption, and social media, to name a few, is growing and will continue to grow.
In this 2008 report, the authors compare various approaches and tools used to capture and analyze evidence from computer memory.
System administrators increasingly need business savvy in addition to technical skills, and IT training courses must try to keep pace with this trend.
This presentation on home computer and Internet user security guides participants on how to improve the security of their home computer in a technology independent manner.
Topics: Network Situational Awareness
In this 2004 report, Larry Rogers describes enterprise networks in a way that helps system administrators see how technology supports the enterprise's mission.
In this presentation, the authors describe a practical framework for enterprise-wide security management as developed by the CERT Division.
Members of the CERT/CC have analyzed coding defects with the goalof understanding each well enough to communicate the details to those responsible for fixing them and those responsible for installing their fixes (systems administrators). This report describes everything that members of the CERT/CC have learned and subsequentlysynthesized from analyzing the rlogin defect.