وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Computer Forensics and Digital Forensics Masterclass 2023+

سرفصل های دوره

Learn computer forensics, digital forensics, mobile forensics, windows forensics, linux forensics and other forensics.


01 - Understanding Cybercrime
  • 001 Introduction to Cybercrime Analysis
  • 002 Three Main Categories of Cybercrime
  • 003 Examples to Cybercrime

  • 02 - Different Types of Digital Forensics
  • 001 The Main Categories of Digital Forensics
  • 002 Computer Forensics
  • 003 Mobile Forensics Android Forensics and IOS Forensics
  • 004 Mobile Forensics Android Forensics Tools and IOS Forensics Tools
  • 005 Understanding Network Forensics and how it works
  • 006 Database Forensics Preventing and Finding Data Breaches
  • 007 Analysis of Forensics Data

  • 03 - Fundamentals of TCPIP
  • 001 What is network protocol and what it does
  • 002 Layers of TCPIP Model
  • 003 How emails sent and received over internet
  • 004 PDU Explained
  • 005 Basic Use of Switch and Data Transmission
  • 006 2 Networks Talking with Router in Middle

  • 04 - Fundamentals of Digital Forensics and Computer Forensics
  • 001 Evolution of Computers
  • 002 What is Digital Evidence
  • 003 How to be Digital Forensics Investigator
  • 004 Introduction to Digital Forensics
  • 005 What is CyberCrime
  • 006 Categories of Digital Forensics
  • 007 Anti-Forensics Enemy of Every Digital Forensics Investigators
  • 008 Anti-Forensics Encryption
  • 009 Anti-Forensics Timestamping

  • 05 - Different Types of Storage
  • 001 The Primitive Storage media types
  • 002 Magnetic Tape Drives and their usage
  • 003 Early age flash disks Floppy Disks
  • 004 Optical Storage Media Types
  • 005 DVD and their usage types in forensics field
  • 006 Blu-ray and its features
  • 007 Flash Storage Media in General
  • 008 Most Popular USB Flash drives
  • 009 Mini Data Centers Flash Cards
  • 010 Hard Disk Drives Best friend of Digital era
  • 011 Solid State Drive Fast but unfortunately expensive

  • 06 - Cybersecurity Fundamentals
  • 001 Cybersecurity Fundamentals
  • 002 VPN
  • 003 Firewall
  • 004 DMZ
  • 005 Windows Firewall Explanation

  • 07 - Building Digital Forensics Lab
  • 001 Creating our Ethical Hacking Lab
  • 002 Getting Started
  • 003 Installing Virtual Machines
  • 004 Installing Kali
  • 005 Installing Metasploitable

  • 08 - Digital Evidence Acquisition Techniques
  • 001 Evidence Acquisition File Types
  • 002 Metadata
  • 003 A5 - Collecting RAM with MGNT
  • 004 A6 - Collecting RAM with FKMT
  • 005 A7 - Memory Acquisition with BLKSFT

  • 09 - Non-Volatile Memory Acquisition
  • 001 A1 - Collecting Storage Media using FKT
  • 002 B2 - Using linux for Non-Volatile Memory Acquistion
  • 003 C3 - Linux Image File splitting
  • 004 D4 - Verifying Hash Values
  • 005 F5 - GYMGR

  • 10 - Analysis of Storage
  • 001 A1 - Image Analysis using FRMT - Part 1
  • 002 A2 - Storage Analysis with SLCPL
  • 003 A3 - Storage Analysis with BLK EXT

  • 11 - Incident Response
  • 001 Incident Response Fundamentals
  • 002 Evidence Collection
  • 003 Hashing Algorithms
  • 004 Boolean Types and Comparison Operators in Programming

  • 12 - Starting with Basic Linux Commands
  • 001 Understanding Linux Commands and Pipes
  • 002 What is a Command
  • 003 Pipeline example #1
  • 004 Weird LS Command
  • 005 Different Linux Commands using with Pipe

  • 13 - Starting with Linux Terminal
  • 001 Understanding key concepts
  • 002 Finding Helpful manuals
  • 003 Linux Directories
  • 004 Linux Directories - Part 2

  • 14 - Starting with Linux Shell and Exploring the Linux System
  • 001 Understanding Linux Commands and Pipes
  • 002 LS Command
  • 003 RD vs APD
  • 004 Filtering LS
  • 005 CP Command
  • 006 Tab Auto-completion
  • 007 SYM AND HRD Link Files
  • 008 Manipulating Files

  • 15 - Starting with Linux Shell
  • 001 Introduction to Shell and Expansion
  • 002 Expressions with Shell
  • 003 Automating Folder Creation with Shell
  • 004 Quoting in Shell

  • 16 - Permissions
  • 001 Introduction to Permissions in Linux
  • 002 Differences between UID, GID and Shadow
  • 003 File and Dir Permissions
  • 004 After this video youll understand all LINUX Permissions
  • 005 Chmod

  • 17 - Processes in Linux
  • 001 Fundamentals of Processes in System
  • 002 The Magic with PS Aux Command
  • 003 The Magic with TOP Command
  • 004 Foreground and Background Processes
  • 005 From Background to Foreground
  • 006 The Tutorial with Linux Process Signals

  • 18 - Packet Management Systems in Linux
  • 001 Introduction to Packet Management Systems
  • 002 Why we need package management tools
  • 003 Package Management in Linux - Final

  • 19 - Getting Started with Networking
  • 001 Trcrt command
  • 002 Networking with Linux

  • 20 - Evidence Analysis
  • 001 Windows Storage Analysis Volatility
  • 002 Windows RAM Analysis Volatility
  • 003 Volatility Malware Infected Storage Analysis
  • 004 Autopsy

  • 21 - Malware Identification
  • 001 Malware Identification Fundamentals
  • 002 Malware Persistence
  • 003 Malware Identification Tools

  • 22 - Fundamentals of Computer Networks
  • 001 Networking - Beginner Part 1
  • 002 Networking - Beginner Part 2
  • 003 Networking - Intermediate Part 1
  • 004 Networking - Intermediate Part 2
  • 005 Networking - Advanced Part 1

  • 23 - Malware Analysis in Computer Forensics
  • 001 Analysis of Malware Codename CRIDEX
  • 002 Analysis of Malware Codename R2D2
  • 003 Analysis of Memory that has Virus

  • 24 - Storage Acquisition
  • 001 Hashing Storage Device
  • 002 Magnet Memory Acquisition
  • 003 Windows File Hashing without any Programs
  • 004 Non-Volatile Memory Acquisition P2
  • 005 Storage Acquisition with Splitting - P3
  • 006 Windows RAM Acquisition
  • 007 FTK Imager Windows Storage Acquisition

  • 25 - Mobile Forensics
  • 001 Mobile Forensics - Part 1
  • 002 Mobile Forensics - Part 2
  • 003 Android Root
  • 004 DONE
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 26771
    حجم: 8394 مگابایت
    مدت زمان: 975 دقیقه
    تاریخ انتشار: 26 آذر 1402
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید