Digital forensic as it applies to pentesting and conducting a digital forensic investigative response.

What you will learn

How to forensically image devices.

How to recover deleted data from various operating systems.

How to produce professional and legal digital forensic reports.

How to properly handle digital media before and during investigations.

How to utilize various forensic tools for digital forensic investigations.

Analyze and reverse engineer software and malware.

Description

Digital forensics is becoming very important in Cyber Security to detect and backtrack Black Hat Criminals. It is essential to remove Hackers’ malicious backdoors/malware and trace them back to avoid possible future incidents. Digital forensics is becoming very important in Cyber Security to detect and backtrack Black Hat Criminals. Digital forensics is essential to remove Hackers’ malicious backdoors/malware and trace them back to avoid possible future incidents.

This course acts as a digital forensics’ primer for pentesters and cybersecurity professionals wanting to expand their knowledge and add additional tools and skills to their resumes.

Please watch the course overview before enrolling. Hands-on, applied learning is not for everyone. This course is not for you if you are looking for a PowerPoint-driven course where students watch videos, download PDF files, and take notes. There are plenty of lecture-driven courses, but this is not one of them.

Make sure you understand the difference between watching and applying.

The course is an excellent primer for anyone considering a career in digital forensics. It’s important to understand the difference between digital forensics and computer security.

This course will consist of video tutorials and lab files that demonstrate the concepts of digital forensics.

This course is designed for anyone interested in digital forensics as it relates to pentesting and ethical hacking.

English

Language

Content

Introduction

Course Overview

Building Your Forensics Lab Environment Using VirtualBox

Video and lab – Installing CSI Linux

Video and Lab – Creating a Kali Live (Forensic Mode) VM Using VirtualBox

Video and lab – Create a Virtual Install Kali Image Using VirtualBox

Video and Lab – Create Virtual Install of Windows 10 Using VirtualBox

Video and Lab – Install Additional Forensic Tools Using Katoolin3

Using Kali Forensic Mode and Autopsy

Video and Lab – Simulate Creating a Disk Image for a Forensic Analysis

Video and Lab – Examining a forensic Disk Image Using Autopsy

Digital Forensics Case Management

Video and Lab -Digital Forensics Using Autopsy Part I

Video and Lab – Digital Forensics Using Autopsy Part II


Subscribe to latest coupons on our Telegram channel.

Video and Lab – Installing the WebMap-Nmap Dashboard

Open-source intelligence (OSINT)

Video and Lab – Conducting OSINT Using CSI Linux Investigator

Video and Lab – Find Social Media Accounts Using Sherlock

Computer Forensics

Video – Attaching an External USB Divice in Kali

Using Shodan to Search for Vulnerable devices

Video and Lab – Preparing CSI Investigator to Use Shodan

Video and Lab – Using Shodan to Find Vulnerable Devices

Video and lab – Using Shodan to Search for Vulnerable Databases

Stenography

Video and Lab – Using Steghide for Hiding and Extracting Data

Network forensics Using Wireshark

Video – Overview of Wireshark 3.2

Video – Wireshark Capture Options

Wireshark Toolbar Icons

Video – Capturing Wireless Traffic Using Wireshark

Video and Lab – Capturing a 3-way TCP Handshake Using Wireshark

Video and Lab – Installing a Wireless Adapter in Kali

Video and Lab – Hacking a Wireless Network Using Kali Linux

Practice What You Have learned

Video and Lab – CTF Lab Build for HA: Forensics

Video and lab – Capture flag #1

Video and lab – Capture flag #2

Video and lab – Capture flag #3

Video and lab – Capture flag #4