What you'll get

  • Govt. Verified Certification
  • Job Credibility
  • Certification Valid for Life
  • Lifetime Access To E-learning

Description

Course content

Total: 69 lectures
  • Chapter 1: Introduction to Digital Forensics
  • What is digital forensics?
  • Digital forensics methodology
  • A brief history of digital forensics
  • The need for digital forensics as technology advances
  • Operating systems and open source tools for digital forensics
  • The need for multiple forensics tools in digital investigations
  • Commercial forensics tools
  • Anti-forensics – threats to digital forensics
  • Chapter 2: Installing Kali Linux
  • Software version
  • Downloading Kali Linux
  • Installing Kali Linux
  • Installing Kali Linux in VirtualBox
  • Chapter 3: Understanding Filesystems and Storage Media
  • The history of storage media
  • Filesystems and operating systems
  • What about the data?
  • Data volatility
  • The paging file and its importance in digital forensics
  • Chapter 4: Incident Response and Data Acquisition
  • Digital evidence acquisition and procedures
  • Incident response and first responders
  • Documentation and evidence collection
  • Chain of custody
  • Live acquisition versus post-mortem acquisition
  • Write blocking
  • Data imaging and hashing
  • Device and data acquisition guidelines and best practices
  • Chapter 5: Evidence Acquisition and Preservation with dc3dd and Guymager
  • Drive and partition recognition in Linux
  • Maintaining evidence integrity
  • Using dc3dd in Kali Linux
  • Image acquisition using DD
  • Image acquisition using Guymager
  • Windows memory acquisition
  • Chapter 6: File Recovery and Data Carving with foremost, Scalpel, and bulk_extractor
  • Forensic test images used in Foremost and Scalpel
  • Using Foremost for file recovery and data carving
  • Using Scalpel for data carving
  • bulk_extractor
  • Chapter 7: Memory Forensics with Volatility
  • Introducing the Volatility Framework
  • Downloading test images for use with Volatility
  • Using Volatility in Kali Linux
  • Chapter 8: Artifact Analysis
  • Identifying devices and operating systems with p0f
  • Information gathering and fingerprinting with Nmap
  • Live Linux forensics with Linux Explorer
  • Ransomware analysis
  • swap_digger
  • Password dumping with mimipenguin
  • Examining Firefox artifacts with pdgmail
  • Chapter 9: Autopsy
  • Introduction to Autopsy
  • The sample image file used in Autopsy
  • Digital forensics with Autopsy
  • Chapter 10: Analysis with Xplico
  • Software requirements
  • Installing Xplico in Kali Linux
  • Starting Xplico in DEFT Linux 8.2
  • Packet capture analysis using Xplico
  • Network activity analysis exercise
  • Chapter 11: Network Analysis
  • Capturing packets using Wireshark
  • NetworkMiner
  • Packet capture analysis with PcapXray
  • Online PCAP analysis
  • Reporting and presentation

Reviews

Please login or register to review
Frequently Asked Questions