وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Digital Forensics Masterclass : Forensic Science 2023 DFMC+

سرفصل های دوره

Learn digital forensics and be computer forensics investigator / Certificate after completing course / DFMC+ / DFIR 2023


01 - Understanding Cybercrime
  • 001 Cybercrime Understanding the Threats of the Digital World
  • 002 The Three Faces of Cybercrime Exploring its Types and Methods
  • 003 Digital Forensics 101 Uncovering the Mysteries of Cybercrime Investigations
  • 004 From Phishing to Ransomware Real-World Examples of Cybercrime in Action

  • 02 - Understanding Digital Forensics
  • 001 Unlocking the Categories of Digital Forensics From Cybercrime to Cybersecurity
  • 002 The Ultimate Guide to Computer Forensics Solving Digital Crimes and Uncovering
  • 003 Mobile Forensics Unraveling the Mysteries of Digital Devices
  • 004 Mobile Forensics Tools Exploring the Latest Advances in Digital Forensic Invest
  • 005 Navigating Network Forensics Strategies and Tools for Investigating Digital Era
  • 006 Inside Database Forensics Analyzing the Heart of Digital Evidence
  • 007 Forensics Data Analysis Uncovering Patterns and Trends in Digital Investigation

  • 03 - Storage Media - Module 1
  • 001 An Exciting Journey through the History of Storage Media
  • 002 Remembering or Forgetting Understanding the Differences between Volatile and No
  • 003 Unraveling the Magic of Magnetic Tape Drives The Backbone of Data Storage
  • 004 The Nostalgic Charm of Floppy Disks A Look into the Iconic Data Storage Medium
  • 005 The Future of Storage How Optical Storage Media Continues to Evolve
  • 006 Unlocking the Power of DVD Understanding the Capabilities of this Revolutionary
  • 007 The Future is Blue Embracing the Capabilities of Blu-ray Technology

  • 04 - Storage Media - Module 2
  • 001 The Future of Data Storage Exploring the Benefits of Flash Storage Media
  • 002 Unlocking the Power of Portable Data A Guide to USB Flash Drives
  • 003 From Camera to Computer The Versatility of Flash Memory Cards

  • 05 - Storage Media - Module 3
  • 001 From Megabytes to Terabytes The Evolution of Hard Disk Drives
  • 002 The Next Generation of Data Storage A Deep Dive into Solid State Drives

  • 06 - Introduction to Networking
  • 001 What is network protocol and what it does
  • 002 Layers of TCPIP Model
  • 003 How emails sent and received over internet
  • 004 PDU Explained
  • 005 Basic Use of Switch and Data Transmission
  • 006 2 Networks Talking with Router in Middle

  • 07 - Digital Evidence Collection
  • 001 Unleashing the Power of the Main Task A Guide to Achieving Success
  • 002 Cracking the Code Understanding Forensics Image File Formats
  • 003 Capturing the Moment Acquiring Volatile Memory for Digital Forensics

  • 08 - Creating Digital Forensics Lab
  • 001 A1-Resources.txt
  • 001 Building a Strong Foundation Creating Your Own Digital Forensics Lab
  • 002 Ready, Set, Go Getting Started with Cybersecurity and DFIR Fundamentals
  • 003 Going Virtual A Step-by-Step Guide to Installing Virtual Machines
  • 004 Installing Kali The Essential Installation Guide for Penetration Testing
  • 005 Breaking In Installing and Configuring Metasploitable for Advanced DFIR Testing

  • 09 - OSINT - Open Source Intelligence for Digital Forensics Pros and Ethical Hackers
  • 001 Introduction to Passive Information Gathering
  • 002 Differences Between Recon and Footprinting
  • 003 Understanding Passive Information Gathering and OSINT
  • 004 Introduction to OSINT
  • 005 The Most Important Principles of Recon
  • 006 REAL Offensive OSINT
  • 007 Using One of the most powerful tools SBLSTR for Finding Subdomains
  • 008 USUFY as Osint Tool
  • 009 Finding Deleted,Erased, Hiddent WebPages with OSINT Techniques
  • 010 The Harvester as Osint Tool - Harvesting as Much info as possible
  • 011 Reverse Image Search - Finding all information from image that you need
  • 012 Usage of GHDB
  • 013 Using GHDB Part 2

  • 10 - Volatile Memory Acquisition
  • 001 Collecting RAM with MGNT
  • 002 Collecting RAM with FKMT
  • 003 Memory Acquisition with BLKSFT

  • 11 - Fundamental Linux Training for Digital Forensics
  • 001 Understanding Linux Commands and Pipes
  • 002 What is a Command
  • 003 Pipeline example #1
  • 004 Weird LS Command
  • 005 Different Linux Commands using with Pipe

  • 12 - Starting with Linux Terminal
  • 001 Understanding key concepts
  • 002 Finding Helpful manuals
  • 003 Linux Directories
  • 004 Linux Directories - Part 2

  • 13 - Exploring the Linux System
  • 001 The bridge between You and Shell
  • 002 LS Command
  • 003 RD vs APD
  • 004 Filtering LS
  • 005 CP Command
  • 006 Tab Auto-completion
  • 007 SYM AND HRD Link Files
  • 008 Manipulating Files

  • 14 - Starting with Linux Shell
  • 001 Introduction to Shell and Expansion
  • 002 Arithmetic Expressions with Shell
  • 003 Automating Folder Creation with Shell
  • 004 Quoting in Shell

  • 15 - Permissions
  • 001 Introduction to Permissions in Linux
  • 002 Differences between UID, GID and Shadow
  • 003 File and Dir Permissions
  • 004 Examples with File Permissions
  • 005 After this video youll understand all LINUX Permissions
  • 006 Chmod

  • 16 - Processes in Linux
  • 001 Fundamentals of Processes in System
  • 002 The Magic with PS Aux Command
  • 003 The Magic with TOP Command
  • 004 Foreground and Background Processes
  • 005 From Background to Foreground
  • 006 The Tutorial with Linux Process Signals

  • 17 - Packet Management Systems in Linux
  • 001 Introduction to Packet Management Systems
  • 002 Why we need package management tools
  • 003 Package Management in Linux - Final

  • 18 - Getting Started with Networking
  • 001 Trcrt command
  • 002 Networking with Linux

  • 19 - Non-Volatile Memory Acquisition
  • 001 Collecting Storage Media using FKT
  • 002 Using Linux for Non-Volatile Memory Acquisltion
  • 003 Linux Image File splitting
  • 004 Verifying Hash Values
  • 005 GYMGR

  • 20 - Analysis of Storage
  • 001 A1-Image-Analysis-using-FRMT-Part-1.txt
  • 001 Image Analysis using FRMT - Part 1
  • 002 Storage Analysis with SLCPL
  • 003 Storage Analysis with BLK EXT

  • 21 - Networking Training for Digital Forenslcs
  • 001 The TCPIP Couse Part 1
  • 002 The TCPIP Couse Part 2

  • 22 - Mobile Forensics
  • 001 Fundamentals of Mobile Forensics
  • 002 Android Forensics and IOS Forensics
  • 003 Android Root

  • 23 - Memory Analysis with Volatility
  • 001 Introduction to Volatility Framework
  • 002 A2.txt
  • 002 Downloading and Installing Volatility
  • 003 Downloading and Unrar Sample Images for Volatility
  • 004 Volatility Plugins - Part 1
  • 005 A5.txt
  • 005 Volatility Plugins Part 2 - Network Analysis
  • 006 A6.txt
  • 006 Network Analysis
  • 007 A7.txt
  • 007 DLL Analysis
  • 008 A8.txt
  • 008 Volatility Registry Analysis
  • 009 A9.txt
  • 009 Password Extraction and Timeliner Plugin
  • 010 A10.txt
  • 010 Volatility Plugins Part 3
  • 011 A11.txt
  • 011 Analysis of the Malware Using Volatility
  • 012 DLL and Memory Dump using Volatility
  • 013 EXE Dump and Last lecture of section
  • 014 DONE
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 26787
    حجم: 7192 مگابایت
    مدت زمان: 811 دقیقه
    تاریخ انتشار: 27 آذر 1402
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید