1. Intro

2. Military lessons

3 Six Steps of Incident Response

4. Assessing Impact of Cyber Attacks

5. Essential IR Business Process and Paperwork

6. Chain of Custody and Evidence Topics

7. Six Step Incident Response Template

8. Commercial Incident Response Template

9. Incident Resonse and Forensics are Partners

10. The Attack Process, Tools, and IR Points

11. Secure Communicaitons

12. Netcat and Cryptcat for the Blue Team

13. Nmap and Masscan Network Assessment

14. Windows Counter Loops

15. Simple Windows Password Guessing

16. Automated Collection (Windows)

17. Malware Standard Response Pattern

18. Windows Volatiles Data Investigation

19. Other Windows Artifact Investigation