Artwork
iconShare
 
Manage episode 494503758 series 3677570
Content provided by Dr Jason Edwards and Dr. Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Dr Jason Edwards and Dr. Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

Raw data becomes actionable intelligence when it’s properly analyzed. In this episode, we focus on the data and log analysis process during an incident, explaining how analysts sift through event logs, network traffic, system alerts, and application telemetry to reconstruct what happened. You’ll learn how to use timeline creation, correlation engines, and pivoting techniques to identify patient zero, trace lateral movement, and evaluate scope.

We also discuss common log sources such as firewalls, proxy servers, authentication systems, and EDR tools, and how to detect when logs have been altered or deleted. This episode reinforces the investigative mindset analysts must develop and helps you approach exam scenarios with confidence. It’s not just about having the data—it’s about knowing what questions to ask when it arrives. Brought to you by BareMetalCyber.com

  continue reading

130 episodes