This lab is the first in a series of three labs where you will be performing forensic analysis in a cloud environment that has fallen victim to an attack. Each lab in the series is in increasing level of difficulty:
In this first lab, you will conduct an analysis on how the attacker gained access to the system. You will use and improve research skills to carry out some preliminary investigations. The lab will also require you to perform log analysis which will introduce you to this forensic technique and how it is performed within a container.
Upon completion of this lab you will be able to:
This lab is intended for:
You should be familiar with:
Tiarnan is a CyberFirst bursary student, working with QA as a cyber security researcher, who joined QA after successfully completing a summer placement. He is currently studying for his computer science degree at Nottingham University.