وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Cybersecurity Foundations: Computer Forensics

سرفصل های دوره

Computer forensics is used to find legal evidence in computers, mobile devices, or data storage units. This course covers all the technical essentials for up-and-coming digital forensics professionals. Instructor Jungwoo Ryoo reviews the goals of computer forensics, the types of investigations it's used for, a forensic investigator's typical tool set, and the legal implications of this type of work.

Explore different specializations currently available in the field to assess your career prospects as an investigator. Jungwoo shows you how to prepare for an investigation, acquire data, ensure data is kept in its original state with software and hardware write-blockers, analyze the data, and generate a report of your findings. Along the way, you’ll discover options for both open-source and commercial software to help find the best tool for your needs and your budget.


01 - Introduction
  • 01 - Computer forensics
  • 02 - What you should know

  • 02 - 1. Understanding Computer Forensics
  • 01 - Definition and goals of computer forensics
  • 02 - History
  • 03 - Types of investigations
  • 04 - Tools
  • 05 - Legal implications
  • 06 - Current and future trends
  • 07 - Challenges
  • 08 - Anti-forensics techniques
  • 09 - Compliance and forensics
  • 10 - Cybersecurity and forensics

  • 03 - 2. Areas of Computer Forensics
  • 01 - Specializations in computer forensics
  • 02 - Network forensics
  • 03 - Operating system forensics
  • 04 - Web forensics
  • 05 - Cloud forensics
  • 06 - Malware forensics
  • 07 - Mobile forensics
  • 08 - Email forensics
  • 09 - Certifications

  • 04 - 3. Preparing for an Investigation
  • 01 - Tools and knowledge requirements
  • 02 - Hardware
  • 03 - Software
  • 04 - Understanding hexadecimal numbers
  • 05 - Using a hex editor
  • 06 - Understanding offset
  • 07 - Forensics OS distributions
  • 08 - Challenge Hex editor
  • 09 - Solution Hex editor

  • 05 - 4. File System Fundamentals
  • 01 - Understanding file systems
  • 02 - Understanding the boot sequence
  • 03 - Understanding disksolid-state drives
  • 04 - Understanding the master boot records (MBR)
  • 05 - Understanding Partitioning
  • 06 - Challenge Partitioning a USB drive
  • 07 - Solution Partitioning a USB drive

  • 06 - 5. Persisting Data
  • 01 - Evidence preservation approaches
  • 02 - Understanding the role of write blockers
  • 03 - Using a software write blocker
  • 04 - Using hardware write blockers
  • 05 - Understanding hashing
  • 06 - Hashing algorithms
  • 07 - Case Study Hashing in FTK Imager
  • 08 - Understanding mounting
  • 09 - Mounting manually
  • 10 - Challenge Hashing in Kali
  • 11 - Solution Hashing in Kali

  • 07 - 6. Aquiring Data
  • 01 - Data acquisition approaches
  • 02 - Static acquisition with open-source tools
  • 03 - Static acquisition case study with dd
  • 04 - Static acquisition case study with dcfldd
  • 05 - Live acquisition case study with a commercial tool
  • 06 - Challenge Live acquisition with a memory dump file
  • 07 - Solution Live acquisition with a memory dump file

  • 08 - 7. Putting It All Together Analyzing Data and Generating Reports
  • 01 - Forensic data analysis
  • 02 - Indexing
  • 03 - Searching
  • 04 - Generating a Report
  • 05 - Case Study Hex editor analysis of a file with a wrong extension
  • 06 - Hex editor analysis of a bit-shifted file
  • 07 - Case Study Steganography

  • 09 - Conclusion
  • 01 - Next steps
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 30450
    حجم: 506 مگابایت
    مدت زمان: 161 دقیقه
    تاریخ انتشار: 2 اسفند 1402
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید