وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Computer Forensics and Digital Forensics Masterclass 2023+

سرفصل های دوره

Learn computer forensics, digital forensics, mobile forensics, windows forensics, linux forensics and other forensics.


01 - Understanding Cybercrime
  • 001 Introduction to Cybercrime Analysis
  • 002 Three Main Categories of Cybercrime
  • 003 Examples to Cybercrime

  • 02 - Different Types of Digital Forensics
  • 001 The Main Categories of Digital Forensics
  • 002 Computer Forensics
  • 003 Mobile Forensics Android Forensics and IOS Forensics
  • 004 Mobile Forensics Android Forensics Tools and IOS Forensics Tools
  • 005 Understanding Network Forensics and how it works
  • 006 Database Forensics Preventing and Finding Data Breaches
  • 007 Analysis of Forensics Data

  • 03 - Fundamentals of TCPIP
  • 001 What is network protocol and what it does
  • 002 Layers of TCPIP Model
  • 003 How emails sent and received over internet
  • 004 PDU Explained
  • 005 Basic Use of Switch and Data Transmission
  • 006 2 Networks Talking with Router in Middle

  • 04 - Fundamentals of Digital Forensics and Computer Forensics
  • 001 Evolution of Computers
  • 002 What is Digital Evidence
  • 003 How to be Digital Forensics Investigator
  • 004 Introduction to Digital Forensics
  • 005 What is CyberCrime
  • 006 Categories of Digital Forensics
  • 007 Anti-Forensics Enemy of Every Digital Forensics Investigators
  • 008 Anti-Forensics Encryption
  • 009 Anti-Forensics Timestamping

  • 05 - Different Types of Storage
  • 001 The Primitive Storage media types
  • 002 Magnetic Tape Drives and their usage
  • 003 Early age flash disks Floppy Disks
  • 004 Optical Storage Media Types
  • 005 DVD and their usage types in forensics field
  • 006 Blu-ray and its features
  • 007 Flash Storage Media in General
  • 008 Most Popular USB Flash drives
  • 009 Mini Data Centers Flash Cards
  • 010 Hard Disk Drives Best friend of Digital era
  • 011 Solid State Drive Fast but unfortunately expensive

  • 06 - Cybersecurity Fundamentals
  • 001 Cybersecurity Fundamentals
  • 002 VPN
  • 003 Firewall
  • 004 DMZ
  • 005 Windows Firewall Explanation

  • 07 - Building Digital Forensics Lab
  • 001 Creating our Ethical Hacking Lab
  • 002 Getting Started
  • 003 Installing Virtual Machines
  • 004 Installing Kali
  • 005 Installing Metasploitable

  • 08 - Digital Evidence Acquisition Techniques
  • 001 Evidence Acquisition File Types
  • 002 Metadata
  • 003 A5 - Collecting RAM with MGNT
  • 004 A6 - Collecting RAM with FKMT
  • 005 A7 - Memory Acquisition with BLKSFT

  • 09 - Non-Volatile Memory Acquisition
  • 001 A1 - Collecting Storage Media using FKT
  • 002 B2 - Using linux for Non-Volatile Memory Acquistion
  • 003 C3 - Linux Image File splitting
  • 004 D4 - Verifying Hash Values
  • 005 F5 - GYMGR

  • 10 - Analysis of Storage
  • 001 A1 - Image Analysis using FRMT - Part 1
  • 002 A2 - Storage Analysis with SLCPL
  • 003 A3 - Storage Analysis with BLK EXT

  • 11 - Incident Response
  • 001 Incident Response Fundamentals
  • 002 Evidence Collection
  • 003 Hashing Algorithms
  • 004 Boolean Types and Comparison Operators in Programming

  • 12 - Starting with Basic Linux Commands
  • 001 Understanding Linux Commands and Pipes
  • 002 What is a Command
  • 003 Pipeline example #1
  • 004 Weird LS Command
  • 005 Different Linux Commands using with Pipe

  • 13 - Starting with Linux Terminal
  • 001 Understanding key concepts
  • 002 Finding Helpful manuals
  • 003 Linux Directories
  • 004 Linux Directories - Part 2

  • 14 - Starting with Linux Shell and Exploring the Linux System
  • 001 Understanding Linux Commands and Pipes
  • 002 LS Command
  • 003 RD vs APD
  • 004 Filtering LS
  • 005 CP Command
  • 006 Tab Auto-completion
  • 007 SYM AND HRD Link Files
  • 008 Manipulating Files

  • 15 - Starting with Linux Shell
  • 001 Introduction to Shell and Expansion
  • 002 Expressions with Shell
  • 003 Automating Folder Creation with Shell
  • 004 Quoting in Shell

  • 16 - Permissions
  • 001 Introduction to Permissions in Linux
  • 002 Differences between UID, GID and Shadow
  • 003 File and Dir Permissions
  • 004 After this video youll understand all LINUX Permissions
  • 005 Chmod

  • 17 - Processes in Linux
  • 001 Fundamentals of Processes in System
  • 002 The Magic with PS Aux Command
  • 003 The Magic with TOP Command
  • 004 Foreground and Background Processes
  • 005 From Background to Foreground
  • 006 The Tutorial with Linux Process Signals

  • 18 - Packet Management Systems in Linux
  • 001 Introduction to Packet Management Systems
  • 002 Why we need package management tools
  • 003 Package Management in Linux - Final

  • 19 - Getting Started with Networking
  • 001 Trcrt command
  • 002 Networking with Linux

  • 20 - Evidence Analysis
  • 001 Windows Storage Analysis Volatility
  • 002 Windows RAM Analysis Volatility
  • 003 Volatility Malware Infected Storage Analysis
  • 004 Autopsy

  • 21 - Malware Identification
  • 001 Malware Identification Fundamentals
  • 002 Malware Persistence
  • 003 Malware Identification Tools

  • 22 - Fundamentals of Computer Networks
  • 001 Networking - Beginner Part 1
  • 002 Networking - Beginner Part 2
  • 003 Networking - Intermediate Part 1
  • 004 Networking - Intermediate Part 2
  • 005 Networking - Advanced Part 1

  • 23 - Malware Analysis in Computer Forensics
  • 001 Analysis of Malware Codename CRIDEX
  • 002 Analysis of Malware Codename R2D2
  • 003 Analysis of Memory that has Virus

  • 24 - Storage Acquisition
  • 001 Hashing Storage Device
  • 002 Magnet Memory Acquisition
  • 003 Windows File Hashing without any Programs
  • 004 Non-Volatile Memory Acquisition P2
  • 005 Storage Acquisition with Splitting - P3
  • 006 Windows RAM Acquisition
  • 007 FTK Imager Windows Storage Acquisition

  • 25 - Mobile Forensics
  • 001 Mobile Forensics - Part 1
  • 002 Mobile Forensics - Part 2
  • 003 Android Root
  • 004 DONE
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 26771
    حجم: 8394 مگابایت
    مدت زمان: 975 دقیقه
    تاریخ انتشار: ۲۶ آذر ۱۴۰۲
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید