kai axford, cissp, mcse sr. security strategist microsoft corporation sec305
DESCRIPTION
Introductions Bets Practices for Investigations Worst Practices for Investigations Questions and AnswersTRANSCRIPT
![Page 1: Kai Axford, CISSP, MCSE Sr. Security Strategist Microsoft Corporation SEC305](https://reader036.vdocument.in/reader036/viewer/2022082909/5a4d1b687f8b9ab0599b2160/html5/thumbnails/1.jpg)
![Page 2: Kai Axford, CISSP, MCSE Sr. Security Strategist Microsoft Corporation SEC305](https://reader036.vdocument.in/reader036/viewer/2022082909/5a4d1b687f8b9ab0599b2160/html5/thumbnails/2.jpg)
The Fundamental Computer Investigation Guide for Microsoft Windows : A DiscussionKai Axford, CISSP, MCSESr. Security StrategistMicrosoft Corporationhttp://blogs.technet.com/kaiaxford
SEC305
![Page 3: Kai Axford, CISSP, MCSE Sr. Security Strategist Microsoft Corporation SEC305](https://reader036.vdocument.in/reader036/viewer/2022082909/5a4d1b687f8b9ab0599b2160/html5/thumbnails/3.jpg)
AgendaIntroductionsBets Practices for InvestigationsWorst Practices for InvestigationsQuestions and Answers
![Page 4: Kai Axford, CISSP, MCSE Sr. Security Strategist Microsoft Corporation SEC305](https://reader036.vdocument.in/reader036/viewer/2022082909/5a4d1b687f8b9ab0599b2160/html5/thumbnails/4.jpg)
ResourcesSecurity Minded – Kai’s Bloghttp://blogs.technet.com/kaiaxford
File System Forensic Analysis. Brian Carrier ISBN: 0-321-26817-2
Digital Evidence and Computer Crime. Eoghan Casey. ISBN: 012162885X
Fundamental Computer Investigation Guide For Windows http://www.microsoft.com/technet/security/guidance/disasterrecovery/computer_investigation/default.mspx
Incident Response: Investigating Computer Crime. Kevin Mandia & Chris ProsiseISBN: 007222696X
Windows Forensic Analysis. Harlan Carvey.ISBN: 159749156X
“How Online Criminals Make Themselves Tough to Find, Near Impossible to Nab”. Berinato, Scott. May 2007. http://www.cio.com
![Page 5: Kai Axford, CISSP, MCSE Sr. Security Strategist Microsoft Corporation SEC305](https://reader036.vdocument.in/reader036/viewer/2022082909/5a4d1b687f8b9ab0599b2160/html5/thumbnails/5.jpg)
Questions?
![Page 6: Kai Axford, CISSP, MCSE Sr. Security Strategist Microsoft Corporation SEC305](https://reader036.vdocument.in/reader036/viewer/2022082909/5a4d1b687f8b9ab0599b2160/html5/thumbnails/6.jpg)
Evaluation Forms
![Page 7: Kai Axford, CISSP, MCSE Sr. Security Strategist Microsoft Corporation SEC305](https://reader036.vdocument.in/reader036/viewer/2022082909/5a4d1b687f8b9ab0599b2160/html5/thumbnails/7.jpg)
© 2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.
The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after
the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.