Scenario: Forensic Data Investigation
Summary In this scenario, we are investigating an employee at our company for misusing company property by stealing other employee’s identities and running a side business. The first thing I attempted to do once I logged into the Sandbox VM was to try to access the suspect’s account […]




You must be logged in to post a comment.