Stats: 3,171,220 members, 7,880,809 topics. Date: Friday, 05 July 2024 at 07:15 AM |
Nairaland Forum / Science/Technology / Digital Forensics And Cyber Security Free Guide (457 Views)
Drone Forensics Helps Smart Inspection / Detectors, Jammers And Cyber-attackers: The Rise Of Anti-drone Tech / #ceh(v9)-certifiedethicalhackertraining And Cyber Security Training (2) (3) (4)
(1) (Reply)
Digital Forensics And Cyber Security Free Guide by soutechremote(m): 8:30pm On Nov 08, 2022 |
Digital Forensics and Cyber Security Free Guide https://www.youtube.com/watch?v=jH2hrbm_HgE&list=PLmi6GtTayDkcqc21yiwejvT-r8pQh5R7B Learning objectives -------------- -Goals of computer forensics -Pursuing a career in computer forensics -Using open source and premium digital forensic tools -File system fundamentals -Acquiring data, preserving and presenting evidence data -Ensuring data integrity -Generating a digital forensic report Modules 1. Introduction and Understanding Computer Forensics: - Goals, History, Types of Investigation, Tools, Legal Implication, Current and Future Trends, Challenges, Anti-forensic Techniques, Compliance and Forensics, Cyber security and Forensics https://www.youtube.com/watch?v=jH2hrbm_HgE&list=PLmi6GtTayDkcqc21yiwejvT-r8pQh5R7B&index=1 2. Careers and Aspects of Digital Forensics: - Network, Operating System, Web Application, Cloud, Malware, Mobile and Email Forensics, Digital Forensic Certifications 3. Preparing for an Investigation: - Tools and Knowledge Requirements, Hardware, Software, Understanding Hex Numbers, Forensic OS Distributions 4. File System Fundamentals: - Boot sequence, Disk Drives, Master Boot Record(MBR),Partitions 5. Cryptography, Password Cracking And Steganography - Cryptography Concepts and Types, Password Cracking methodologies, Hiding Files and revealing hidden files during forensic investigations 6. Acquiring Data and Preserving Data - Data Aquizition approaches, static acquisition with open-source tools, dcfldd software, commercial tools for acquiring data, memory dump analysis with volatility. - Evidence Preservation approaches, Role of Write blockers, Software and Hardware Write blockers, Hashing and File Integrity and Algorithms, FTK Imager, Understanding Disk Mounting. https://www.youtube.com/watch?v=JRJITjuWc-k&list=PLmi6GtTayDkcqc21yiwejvT-r8pQh5R7B&index=8 7. Analyzing Data and Presentation Of Digital Evidence - Forensic Data Analysis, Staganography, Generating Reports, Tools for the course --------------------- -Windows and Linux Operating System -Autopsy -VMware -Hex Workshop -dcfldd -Volatility Foundation -FTK Imager -Openstego -Wireshark -VirusTotal -Sucuri -Bulk Extractor -DD Linux Utility -SysInternal -GParted -BinaryHexConverter.com Inbox if you need further guide and mentorship. thanks |
(1) (Reply)
The Full Plan For Artemis Part 3: The Moon Base And Beyond / Snapvade - The Best #1 Video Downloader For Android And Ios / IT Trends
(Go Up)
Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health religion celebs tv-movies music-radio literature webmasters programming techmarket Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10) Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 9 |