Pillar A: CybersecurityA7

Incident Response & Forensics

IR playbooks, memory/disk/network forensics, chain of custody, malware analysis.

Part of Pillar A: Cybersecurity · Cybersecurity groups the disciplines that share methods, tools, and threat models with Incident Response & Forensics.

What is Incident Response & Forensics?

Incident Response (IR) and Digital Forensics are the disciplines of detecting, containing, investigating, and recovering from cybersecurity incidents. When a breach occurs — whether ransomware, data exfiltration, insider threat, or supply chain compromise — the IR team's speed and effectiveness determine the difference between a contained event and a catastrophic business failure.

Incident response follows structured frameworks (NIST SP 800-61, SANS PICERL) through phases: preparation, identification, containment, eradication, recovery, and lessons learned. IR playbooks codify response procedures for common scenarios — phishing, malware, unauthorized access, DDoS — ensuring consistent, rapid action under pressure. Tabletop exercises and purple team simulations test and refine these playbooks before real incidents occur.

Digital forensics provides the investigative backbone of incident response. Memory forensics (using tools like Volatility) captures running processes, network connections, and injected code that disappear when a system is powered down. Disk forensics examines file systems, registry hives, event logs, and deleted files to reconstruct attacker activity. Network forensics analyzes packet captures and flow data to trace lateral movement and data exfiltration. Throughout the process, chain of custody procedures ensure evidence is admissible in legal proceedings and regulatory investigations.

Why it matters

Every organization will face a security incident. The difference between a manageable event and a business-ending disaster is the quality of preparation, speed of response, and rigor of investigation. IR readiness is not optional — it is existential.

Incident response and forensics is the domain that activates when all other defenses fail. It depends on detection engineering for alerts, threat intelligence for context, and network/endpoint security for telemetry, while feeding lessons learned back into every defensive domain.

Key topics

IR frameworks (NIST SP 800-61, SANS PICERL)
IR playbook development and maintenance
Memory forensics (Volatility, Rekall)
Disk forensics (Autopsy, FTK, EnCase)
Network forensics (Wireshark, Zeek, packet analysis)
Chain of custody and evidence handling
Timeline analysis and event correlation
Ransomware response and negotiation
Tabletop exercises and IR simulations
Legal and regulatory notification requirements
Post-incident review and lessons learned

Standards and frameworks

Curated resources

Authoritative sources we ground Incident Response & Forensics questions in — frameworks, research, guides, and tools.

CISAframework

CISA #StopRansomware

Federal hub for ransomware prevention, mitigation, and recovery guidance. Joint advisories with FBI/MS-ISAC, no-cost CISA services, and the ransomware-specific recovery checklist.

Mandiant (Google Cloud)guide

Mandiant APT Reports

Detailed campaign analyses with TTPs mapped to ATT&CK. APT1, APT28/29, UNC groups. Primary source for threat-actor-specific IR questions. Not marketing — these are original threat research.

Verizonresearch

Verizon Data Breach Investigations Report (DBIR)

Annual analysis of real breach data. The gold standard for empirical questions about attack patterns, threat actor motivations, and time-to-detection. Updated annually.

Mandiant (Google Cloud)guide

Mandiant M-Trends Report

Annual IR data: dwell time trends, initial access vectors, detection sources. Empirical data from thousands of engagements. One of the few sources for real-world detection/response metrics.

Independentguide

Krebs, B. — KrebsOnSecurity

Investigative journalism on cybercrime, breaches, and network security incidents. Good for real-world scenario questions grounded in actual events.

NISTframework

NIST SP 800-61 Rev. 2 — Computer Security Incident Handling Guide

Four phases: Preparation, Detection & Analysis, Containment/Eradication/Recovery, Post-Incident Activity. The canonical IR reference. Questions should test decision-making within phases, not just naming them.

SANSguide

SANS Incident Handler's Handbook

Practitioner-oriented IR methodology. Six steps (Preparation, Identification, Containment, Eradication, Recovery, Lessons Learned). Compare/contrast with NIST for methodology questions.

NISTframework

NIST SP 800-86 — Forensics Guide

Guide to integrating forensic techniques into incident response. Covers data collection, examination, analysis, and reporting.

Brian Carriertool

The Sleuth Kit (TSK) & Autopsy

Open-source digital forensics tools for disk image analysis. Industry standard for incident investigation and evidence collection.

Volatility Foundationtool

Volatility Framework

Open-source memory forensics framework. Extracts digital artifacts from volatile memory (RAM) dumps.

Certifications that signal this domain

Credentials whose blueprint meaningfully covers this domain. Core means centrally covered; also touched means present in the blueprint but not the primary focus.

Core coverage

ASIS PCIProfessional·ASISOfficial page →

ASIS Professional Certified Investigator

ASIS Professional Certified Investigator

BTL1Professional·Security Blue TeamOfficial page →

Security Blue Team Level 1

The BTL1 is one of the most practical entry-level certifications in the defensive area of cybersecurity. The exam is a complete 24-hour incident response scenario in a real lab environment – not a multiple-choice test. For career changers and entry-level professionals, it is a credible proof of competency that offers employers more meaningful value than many purely knowledge-based certificates. The course covers phishing analysis, SIEM, digital forensics, threat intelligence, and incident response. The certificate never expires, making it attractive long-term.

BTL2Professional·Security Blue TeamOfficial page →

Security Blue Team Level 2

Security Blue Team Level 2

CAWFEExpert·INE/eLearnSecurityOfficial page →

IACIS Certified Advanced Windows Forensic Examiner

IACIS Certified Advanced Windows Forensic Examiner

CCDProfessional·CyberDefendersOfficial page →

Certified CyberDefender

Certified CyberDefender

CFCEProfessional·INE/eLearnSecurityOfficial page →

IACIS Certified Forensic Computer Examiner

IACIS Certified Forensic Computer Examiner

CHFIProfessional·EC-CouncilOfficial page →

EC Council Computer Hacking Forensics Investigator

EC Council Computer Hacking Forensics Investigator

CISMLeadership·ISACAOfficial page →

Certified Information Security Manager

Security program management, risk, governance, and incident governance. The manager / CISO-track signal.

CREST CPIAProfessional·CRESTOfficial page →

CREST Practitioner Intrusion Analyst

CREST Practitioner Intrusion Analyst

CREST CRIAProfessional·CRESTOfficial page →

CREST Registered Intrusion Analyst

CREST Registered Intrusion Analyst

CrowdStrike CCFAAssociate·CrowdStrikeOfficial page →

CrowdStrike Certified Falcon Administrator

Day-to-day administration of the market-leading EDR platform — sensor deployment, policy authoring, and detection triage in Falcon.

CSFAProfessional·UnbekanntOfficial page →

CSIAC CyberSecurity Forensic Analyst

CSIAC CyberSecurity Forensic Analyst

CSX-PProfessional·ISACAOfficial page →

ISACA Cybersecurity Practitioner

ISACA Cybersecurity Practitioner

ECIHProfessional·EC-CouncilOfficial page →

EC Council Certified Incident Handler

EC Council Certified Incident Handler

EDRPProfessional·EC-CouncilOfficial page →

EC Council Disaster Recovery Professional

EC Council Disaster Recovery Professional

EnCEProfessional·OpenText (EnCase)Official page →

OpenText EnCase Certified Examiner

OpenText EnCase Certified Examiner

GCFAProfessional·GIAC / SANSOfficial page →

GIAC Certified Forensic Analyst

Advanced host forensics, memory analysis, timeline reconstruction.

GCFEProfessional·GIAC / SANSOfficial page →

GIAC Certified Forensic Examiner

Windows host forensics and digital investigation.

GCFRProfessional·GIACOfficial page →

GIAC Cloud Forensics Responder

GIAC Cloud Forensics Responder

GCIHProfessional·GIAC / SANSOfficial page →

GIAC Certified Incident Handler

Incident handling methodology and lifecycle.

GIMEProfessional·GIACOfficial page →

GIAC iOS and MacOS Examiner

GIAC iOS and MacOS Examiner

GNFAProfessional·GIACOfficial page →

GIAC Network Forensic Analyst

GIAC Network Forensic Analyst

GREMExpert·GIAC / SANSOfficial page →

GIAC Reverse Engineering Malware

Static + dynamic malware analysis, unpacking, custom RE tooling.

GRIDProfessional·GIAC / SANSOfficial page →

GIAC Response and Industrial Defense

Active defense and incident response for ICS environments.

GSEExpert·GIACOfficial page →

GIAC Security Expert

The GIAC Security Expert (GSE) is the highest distinction in the GIAC certification system and was fundamentally reformed in 2023/2024: Instead of a single exam, it is now awarded as a portfolio certification. Those who demonstrate six Practitioner and four Applied Knowledge certifications (hands-on, proctored lab exams) automatically receive GSE status. The model enforces genuine breadth and depth – which increases credibility compared to earlier pure knowledge tests. However, the effort (cost, time, multiple exams) is considerable; the GSE is therefore clearly aimed at experienced experts pursuing SANS/GIAC as a career path. In Europe, awareness outside the SANS community is still limited.

GSOCProfessional·GIAC / SANSOfficial page →

GIAC Security Operations Certified

SOC operations, alert triage, metrics, SOAR.

HTB CDSAProfessional·Hack The BoxOfficial page →

Hack the Box Certified Defensive Security Analyst

Hack the Box Certified Defensive Security Analyst

ISSMPExpert·ISC2Official page →

Information Systems Security Management Professional

ISC2 specialization for security management. Requires CISSP. Focus on Leadership, Risk Management, Security Operations, and Compliance Management. For CISOs and senior security executives.

OSDAProfessional·OffSecOfficial page →

Offensive Security Defense Analyst

Offensive Security Defense Analyst

Also touched

CISSPExpert·ISC2Official page →

Certified Information Systems Security Professional

Breadth across security engineering, architecture, operations, and governance at senior-IC / manager level. The default senior-generalist signal.

CySA+Associate·CompTIAOfficial page →

CompTIA Cybersecurity Analyst+

SOC analyst skills: triage, log analysis, vulnerability management basics.

GICSPProfessional·GIAC / SANSOfficial page →

Global Industrial Cyber Security Professional

IT + engineering overlap for industrial control systems.

Splunk ES AdminProfessional·SplunkOfficial page →

Splunk Enterprise Security Certified Admin

Operates and tunes Splunk Enterprise Security — content, correlation searches, notable events, and risk-based alerting.

Browse all certifications → — pick a cert on the interactive map to highlight every domain it covers.

Education and certifications

More in Cybersecurity

Test what you know about Incident Response & Forensics

44 questions available. Beginner to expert questions, scored against the global leaderboard.