Digital forensic as it applies to pentesting and conducting a digital forensic investigative response.
☑ How to forensically image devices.
☑ How to recover deleted data from various operating systems.
☑ How to produce professional and legal digital forensic reports.
☑ How to properly handle digital media before and during investigations.
☑ How to utilize various forensic tools for digital forensic investigations.
☑ Analyze and reverse engineer software and malware.
Digital forensics is becoming very important in Cyber Security to detect and backtrack Black Hat Criminals. It is essential to remove Hackers’ malicious backdoors/malware and trace them back to avoid possible future incidents. Digital forensics is becoming very important in Cyber Security to detect and backtrack Black Hat Criminals. Digital forensics is essential to remove Hackers’ malicious backdoors/malware and trace them back to avoid possible future incidents.
This course acts as a digital forensics’ primer for pentesters and cybersecurity professionals wanting to expand their knowledge and add additional tools and skills to their resumes.
Please watch the course overview before enrolling. Hands-on, applied learning is not for everyone. This course is not for you if you are looking for a PowerPoint-driven course where students watch videos, download PDF files, and take notes. There are plenty of lecture-driven courses, but this is not one of them.
Make sure you understand the difference between watching and applying.
The course is an excellent primer for anyone considering a career in digital forensics. It’s important to understand the difference between digital forensics and computer security.
This course will consist of video tutorials and lab files that demonstrate the concepts of digital forensics.
This course is designed for anyone interested in digital forensics as it relates to pentesting and ethical hacking.
Building Your Forensics Lab Environment Using VirtualBox
Video and lab – Installing CSI Linux
Video and Lab – Creating a Kali Live (Forensic Mode) VM Using VirtualBox
Video and lab – Create a Virtual Install Kali Image Using VirtualBox
Video and Lab – Create Virtual Install of Windows 10 Using VirtualBox
Video and Lab – Install Additional Forensic Tools Using Katoolin3
Using Kali Forensic Mode and Autopsy
Video and Lab – Simulate Creating a Disk Image for a Forensic Analysis
Video and Lab – Examining a forensic Disk Image Using Autopsy
Digital Forensics Case Management
Video and Lab -Digital Forensics Using Autopsy Part I
Video and Lab – Digital Forensics Using Autopsy Part II
Video and Lab – Installing the WebMap-Nmap Dashboard
Open-source intelligence (OSINT)
Video and Lab – Conducting OSINT Using CSI Linux Investigator
Video and Lab – Find Social Media Accounts Using Sherlock
Video – Attaching an External USB Divice in Kali
Using Shodan to Search for Vulnerable devices
Video and Lab – Preparing CSI Investigator to Use Shodan
Video and Lab – Using Shodan to Find Vulnerable Devices
Video and lab – Using Shodan to Search for Vulnerable Databases
Video and Lab – Using Steghide for Hiding and Extracting Data
Network forensics Using Wireshark
Video – Overview of Wireshark 3.2
Video – Wireshark Capture Options
Wireshark Toolbar Icons
Video – Capturing Wireless Traffic Using Wireshark
Video and Lab – Capturing a 3-way TCP Handshake Using Wireshark
Video and Lab – Installing a Wireless Adapter in Kali
Video and Lab – Hacking a Wireless Network Using Kali Linux
Practice What You Have learned
Video and Lab – CTF Lab Build for HA: Forensics
Video and lab – Capture flag #1
Video and lab – Capture flag #2
Video and lab – Capture flag #3
Video and lab – Capture flag #4