• Post category:StudyBullet-3
  • Reading time:10 mins read


Learn digital forensics and be professional digital forensics investigator. Learn computer forensics and investigate NEW

What you will learn

Digital Forensics Fundamentals

Creating Digital Forensics Lab

Investigate Volatile and Non-Volatile Memory

Data Acquisition

Linux

Cyber Security

TCP/IP

Digital forensics LAW

Networking

Malware Analysis

Evidence Analysis

Debugging

Mobile Forensics

Web Browser Forensics

and other awesome topics ->

Description

Digital forensics is a branch of forensic science encompassing the recovery, investigation, examination and analysis of material found in digital devices, often in relation to mobile devices and computer crime. The term digital forensics was originally used as a synonym for computer forensics but has expanded to cover investigation of all devices capable of storing digital data. With roots in the personal computing revolution of the late 1970s and early 1980s, the discipline evolved in a haphazard manner during the 1990s, and it was not until the early 21st century that national policies emerged.

Digital forensics investigations have a variety of applications. The most common is to support or refute a hypothesis before criminal or civil courts. Criminal cases involve the alleged breaking of laws that are defined by legislation and that are enforced by the police and prosecuted by the state, such as theft and assault against the person. Civil cases on the other hand deal with protecting the rights and property of individuals (often associated with family disputes) but may also be concerned with contractual disputes between commercial entities where a form of digital forensics referred to as electronic discovery (ediscovery) may be involved

During the 1980s very few specialized digital forensic tools existed, and consequently investigators often performed live analysis on media, examining computers from within the operating system using existing sysadmin tools to extract evidence. This practice carried the risk of modifying data on the disk, either inadvertently or otherwise, which led to claims of evidence tampering. A number of tools were created during the early 1990s to address the problem.


Get Instant Notification of New Courses on our Telegram channel.


Digital forensics is commonly used in both criminal law and private investigation. Traditionally it has been associated with criminal law, where evidence is collected to support or oppose a hypothesis before the courts. As with other areas of forensics this is often a part of a wider investigation spanning a number of disciplines. In some cases, the collected evidence is used as a form of intelligence gathering, used for other purposes than court proceedings (for example to locate, identify or halt other crimes). As a result, intelligence gathering is sometimes held to a less strict forensic standard.

English
language

Content

Introduction
Introduction to Digital Forensics
How to be Digital Forensics Investigator
What is Cyber Crime ?
Digital Forensics Fundamentals
Digital Forensics Categories
Digital Evidence
Evolution of Computers
Anti-Forensics
Storage Devices
Volatile and Non-Volatile Memory Types
SSD
CD
HDD
Building Digital Forensics Lab
Digital Forensics Lab Requirements
Installing Android Emulator
Installing FTK Manager
Installing Digital Forensics Lab
Digital Forensics Tools and OS
Installing Kali Linux – Part 1
Cybersecurity Fundamentals
Cybersecurity Fundamentals
VPN
Firewall
DMZ
Windows Firewall Explanation
Linux and Technical Training
Linux Working With Files – Part 1
Linux Working With Files – Part 2
Working with Processes – Part 1
Working With Processes – Part 3
Linux Filtering Processes
Linux – Filesystem Part 1
Linux – Filesystem Part 2
Linux – Working With Archive Files 1
Linux – Working With Archive Files 2
Digital Evidence Acquisition Techniques
Metadata
Evidence Acquisition File Types
Digital Forensics Law Enforcement
Digital Forensics Law Enforcement
Incident Response
Incident Response Fundamentals
Evidence Collection
Hashing Algorithms
Storage Acquisition
Windows RAM Acquisition
Magnet Memory Acquisition
Windows File Hashing without any Programs
Non-Volatile Memory Acquisition P2
Storage Acquistion with Splitting – P3
Hashing Storage Device
FTK Imager Windows Storage Acquisition
Networking Fundamentals
Networking – Beginner Part 1
Networking – Beginner Part 2
Networking – Intermediate Part 1
Networking – Intermediate Part 2
Networking – Advanced Part 1
Evidence Analysis
Windows Storage Analysis Volatility
Windows RAM Analysis Volatility
Volatility Malware Infected Storage Analysis
Autospy
Malware Identification
Malware Identification Fundamentals
Malware Persistence
Malware Identification Tools
Malware Analysis
Cridex
Infected Memory Analysis
R2D2 Infected Memory Analysis
Debugging Infected Program
Mobile Forensics
Android Root
Mobile Forensics – Part 1
Mobile Forensics – Part 2
Web Browser Forensics
Web Browser Forensics – Practical Example