• Post category:StudyBullet-12
  • Reading time:8 mins read


Learn digital forensics and start your own cases to analyze infected systems.

What you will learn

Digital Forensics

Usage of Linux Commands

Computer Forensics

Volatility Framework

Linux Training

Cyber Security Training

Mobile Forensics

Anti-Forensics

Windows Forensics

Windows Registry

and other awesome topics –>>

Description

What is computer forensics?

Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation and maintain a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it. Computer forensics — which is sometimes referred to as computer forensic science essentially is data recovery with legal compliance guidelines to make the information admissible in legal proceedings. The terms digital forensics and cyber forensics are often used as synonyms for computer forensics. Digital forensics starts with the collection of information in a way that maintains its integrity. Investigators then analyze the data or system to determine if it was changed, how it was changed and who made the changes. The use of computer forensics isn’t always tied to a crime. The forensic process is also used as part of data recovery processes to gather data from a crashed server, failed drive, reformatted operating system (OS) or other situation where a system has unexpectedly stopped working.


Get Instant Notification of New Courses on our Telegram channel.


Why is computer forensics important?

In the civil and criminal justice system, computer forensics helps ensure the integrity of digital evidence presented in court cases. As computers and other data-collecting devices are used more frequently in every aspect of life, digital evidence and the forensic process used to collect, preserve and investigate it — has become more important in solving crimes and other legal issues.

English
language

Content

Fundamentals of Digital Forensics and Computer Forensics

Evolution of Computers
What is Digital Evidence ?
Categories of Digital Forensics
Anti-Forensics : Enemy of Every Digital Forensics Investigators
Anti-Forensics : Encryption
Anti-Forensics : Timestamping

Cybersecurity Fundamentals

Cybersecurity Fundamentals
VPN
Firewall
DMZ
Windows Firewall Explanation

Building Digital Forensics Lab

Digital Forensics Lab Requirements
Digital Forensics Tools and OS
Installing Kali Linux – Part 1
Installing Digital Forensics Lab
Installing FTK Manager
Installing Android Emulator

Digital Evidence Acquisition Techniques

Evidence Acquisition File Types
Metadata

Incident Response

Incident Response Fundamentals
Evidence Collection
Hashing Algorithms
Boolean Types and Comparison Operators in Programming

Linux and Technical Training

Linux Working With Files – Part 1
Linux Working With Files – Part 2
Working with Processes – Part 1
Working With Processes – Part 2
Working With Processes – Part 3
Linux Filtering Processes
Linux – Filesystem Part 1
Linux – Filesystem Part 2
Linux – Working With Archive Files 1
Linux – Working With Archive Files 2

Evidence Analysis

Windows Storage Analysis Volatility
Windows RAM Analysis Volatility
Volatility Malware Infected Storage Analysis
Autopsy

Malware Identification

Malware Identification Fundamentals
Malware Persistence
Malware Identification Tools

Fundamentals of Computer Networks

Networking – Beginner Part 1
Networking – Beginner Part 2
Networking – Intermediate Part 1
Networking – Intermediate Part 2
Networking – Advanced Part 1

Malware Analysis in Computer Forensics

Analysis of Malware Codename : CRIDEX
Analysis of Malware Codename : R2D2
Analysis of Memory that has Virus

Storage Acquisition

Hashing Storage Device
Magnet Memory Acquisition
Windows File Hashing without any Programs
Non-Volatile Memory Acquisition P2
Storage Acquisition with Splitting – P3
Windows RAM Acquisition
FTK Imager Windows Storage Acquisition

Mobile Forensics

Mobile Forensics – Part 1
Mobile Forensics – Part 2
Android Root