# You are as big as the ocean

## Ecir&#x20;

<figure><img src="https://3843034762-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FWo0MohAfJSwSuo4UQ6uM%2Fuploads%2FNZD08xaMSFqpcBogrljb%2Fdownload.jpg?alt=media&#x26;token=0c2ab37c-fee3-46e0-ad52-6cd2542afa16" alt=""><figcaption></figcaption></figure>

even if i don't like the way the course is called it self , but it's have some good point like practicale incident handel , network analysis domain is also good way to know how the attack happend on your network and how to analysis . it's just a course you sharp your skills with it, it's not enough

## Ecdfp

<figure><img src="https://3843034762-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FWo0MohAfJSwSuo4UQ6uM%2Fuploads%2Fr4OYmSkmYabohPY9ywO7%2Fdownload%20(2).jpg?alt=media&#x26;token=356b70f0-676d-4231-8130-f12ca3978048" alt=""><figcaption></figcaption></figure>

this course talk in deep about some topic like disk analysis , memory analysis , it's not professional as it's called , it's just a normal course talk in deep about some topic related to Digital forensics&#x20;

## Let's take this shit to it's end&#x20;

## FOR500: Windows Forensic Analysis

<figure><img src="https://3843034762-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FWo0MohAfJSwSuo4UQ6uM%2Fuploads%2FOkWKOUOUmcbQyaqyKOnv%2FGCFE.png?alt=media&#x26;token=f0cdb8ed-cd9e-43d3-b677-a897270ce6f4" alt="" width="300"><figcaption></figcaption></figure>

ok slow down don't paink , the course here is talk about building in-depth digital forensics knowledge of Microsoft Windows operating systems , there is good books like Shell Items and Removable Device Profiling , shell bug , web browse forensics  and other good topics

{% hint style="info" %}
there will be course from sans talk about linux forensics , when the course is publish by sans i will mention it&#x20;
{% endhint %}

## FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics

<figure><img src="https://3843034762-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FWo0MohAfJSwSuo4UQ6uM%2Fuploads%2FENAvxERKK9XyWpEJHts6%2FGCFA.png?alt=media&#x26;token=7c7c82b5-9104-4bce-8ef4-65b486f0f0d2" alt="" width="300"><figcaption></figcaption></figure>

this is one of my favirout course , it's realy talked in deep details about  detection for some of common Persistence Techniques , How and when did the attackers obtain domain administrator credentials , Determine what was stolen: Recover any attacker archives, find encryption passwords, and extract the contents to verify exfiltrated data , powershell Remoting/WMIC hacking , Cobalt Strike Lateral Movement and Credential Use , it's really some of my iconic course&#x20;

<figure><img src="https://3843034762-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FWo0MohAfJSwSuo4UQ6uM%2Fuploads%2FYwYnHI4jy7qI6WBzklkp%2F35099.gif?alt=media&#x26;token=20260771-aaec-4458-83a6-49abbaf172b5" alt=""><figcaption></figcaption></figure>

## إن أحسنت فمن الله، وإن أسأت فمن نفسي والشيطان

{% hint style="info" %}
لا تنسوني من صالح دعائكم&#x20;
{% endhint %}
