What's New at DFIR Training

June 20, 2020. Regularly updated, never outdone, check out the latest additions to keep up on your DFIR training! Website updates. DFIR Subcontractor listings, Forensic Artifacts and more.

 Enter for a chance to win a Guardonix Write Blocker!

Enter your name/email address here: I WANT TO WIN!

  • Books
  • PowerShell and Python Together: Targeting Digital Investigations

PowerShell and Python Together: Targeting Digital Investigations

36

Books

Year published
Author(s)
Chet Hosmer
Description
Paperback: 232 pages
Publisher: Apress; 1st ed. edition (March 30, 2019)
Language: English
ISBN-10: 1484245032
ISBN-13: 978-1484245033
Product Dimensions: 6.1 x 0.5 x 9.2 inches
Bring together the Python programming language and Microsoft’s PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.


You will learn how to join PowerShell's robust set of commands and access to the internals of both the MS Windows desktop and enterprise devices and Python's rich scripting environment allowing for the rapid development of new tools for investigation, automation, and deep analysis.


PowerShell and Python Together takes a practical approach that provides an entry point and level playing field for a wide range of individuals, small companies, researchers, academics, students, and hobbyists to participate.


What You’ll Learn


  • Leverage the internals of PowerShell for: digital investigation, incident response, and forensics
  • Leverage Python to exploit already existing PowerShell CmdLets and aliases to build new automation and analysis capabilities
  • Create combined PowerShell and Python applications that provide: rapid response capabilities to cybersecurity events, assistance in the precipitous collection of critical evidence (from the desktop and enterprise), and the ability to analyze, reason about, and respond to events and evidence collected across the enterprise

Who This Book Is For System administrators, IT personnel, incident response teams, forensic investigators, professors teaching in undergraduate and graduate programs in cybersecurity, students in cybersecurity and computer science programs, and software developers and engineers developing new cybersecurity defenses

User comments

There are no user comments for this listing.