وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Digital Forensics Masterclass : Forensic Science 2023 DFMC+

سرفصل های دوره

Learn digital forensics and be computer forensics investigator / Certificate after completing course / DFMC+ / DFIR 2023


01 - Understanding Cybercrime
  • 001 Cybercrime Understanding the Threats of the Digital World
  • 002 The Three Faces of Cybercrime Exploring its Types and Methods
  • 003 Digital Forensics 101 Uncovering the Mysteries of Cybercrime Investigations
  • 004 From Phishing to Ransomware Real-World Examples of Cybercrime in Action

  • 02 - Understanding Digital Forensics
  • 001 Unlocking the Categories of Digital Forensics From Cybercrime to Cybersecurity
  • 002 The Ultimate Guide to Computer Forensics Solving Digital Crimes and Uncovering
  • 003 Mobile Forensics Unraveling the Mysteries of Digital Devices
  • 004 Mobile Forensics Tools Exploring the Latest Advances in Digital Forensic Invest
  • 005 Navigating Network Forensics Strategies and Tools for Investigating Digital Era
  • 006 Inside Database Forensics Analyzing the Heart of Digital Evidence
  • 007 Forensics Data Analysis Uncovering Patterns and Trends in Digital Investigation

  • 03 - Storage Media - Module 1
  • 001 An Exciting Journey through the History of Storage Media
  • 002 Remembering or Forgetting Understanding the Differences between Volatile and No
  • 003 Unraveling the Magic of Magnetic Tape Drives The Backbone of Data Storage
  • 004 The Nostalgic Charm of Floppy Disks A Look into the Iconic Data Storage Medium
  • 005 The Future of Storage How Optical Storage Media Continues to Evolve
  • 006 Unlocking the Power of DVD Understanding the Capabilities of this Revolutionary
  • 007 The Future is Blue Embracing the Capabilities of Blu-ray Technology

  • 04 - Storage Media - Module 2
  • 001 The Future of Data Storage Exploring the Benefits of Flash Storage Media
  • 002 Unlocking the Power of Portable Data A Guide to USB Flash Drives
  • 003 From Camera to Computer The Versatility of Flash Memory Cards

  • 05 - Storage Media - Module 3
  • 001 From Megabytes to Terabytes The Evolution of Hard Disk Drives
  • 002 The Next Generation of Data Storage A Deep Dive into Solid State Drives

  • 06 - Introduction to Networking
  • 001 What is network protocol and what it does
  • 002 Layers of TCPIP Model
  • 003 How emails sent and received over internet
  • 004 PDU Explained
  • 005 Basic Use of Switch and Data Transmission
  • 006 2 Networks Talking with Router in Middle

  • 07 - Digital Evidence Collection
  • 001 Unleashing the Power of the Main Task A Guide to Achieving Success
  • 002 Cracking the Code Understanding Forensics Image File Formats
  • 003 Capturing the Moment Acquiring Volatile Memory for Digital Forensics

  • 08 - Creating Digital Forensics Lab
  • 001 A1-Resources.txt
  • 001 Building a Strong Foundation Creating Your Own Digital Forensics Lab
  • 002 Ready, Set, Go Getting Started with Cybersecurity and DFIR Fundamentals
  • 003 Going Virtual A Step-by-Step Guide to Installing Virtual Machines
  • 004 Installing Kali The Essential Installation Guide for Penetration Testing
  • 005 Breaking In Installing and Configuring Metasploitable for Advanced DFIR Testing

  • 09 - OSINT - Open Source Intelligence for Digital Forensics Pros and Ethical Hackers
  • 001 Introduction to Passive Information Gathering
  • 002 Differences Between Recon and Footprinting
  • 003 Understanding Passive Information Gathering and OSINT
  • 004 Introduction to OSINT
  • 005 The Most Important Principles of Recon
  • 006 REAL Offensive OSINT
  • 007 Using One of the most powerful tools SBLSTR for Finding Subdomains
  • 008 USUFY as Osint Tool
  • 009 Finding Deleted,Erased, Hiddent WebPages with OSINT Techniques
  • 010 The Harvester as Osint Tool - Harvesting as Much info as possible
  • 011 Reverse Image Search - Finding all information from image that you need
  • 012 Usage of GHDB
  • 013 Using GHDB Part 2

  • 10 - Volatile Memory Acquisition
  • 001 Collecting RAM with MGNT
  • 002 Collecting RAM with FKMT
  • 003 Memory Acquisition with BLKSFT

  • 11 - Fundamental Linux Training for Digital Forensics
  • 001 Understanding Linux Commands and Pipes
  • 002 What is a Command
  • 003 Pipeline example #1
  • 004 Weird LS Command
  • 005 Different Linux Commands using with Pipe

  • 12 - Starting with Linux Terminal
  • 001 Understanding key concepts
  • 002 Finding Helpful manuals
  • 003 Linux Directories
  • 004 Linux Directories - Part 2

  • 13 - Exploring the Linux System
  • 001 The bridge between You and Shell
  • 002 LS Command
  • 003 RD vs APD
  • 004 Filtering LS
  • 005 CP Command
  • 006 Tab Auto-completion
  • 007 SYM AND HRD Link Files
  • 008 Manipulating Files

  • 14 - Starting with Linux Shell
  • 001 Introduction to Shell and Expansion
  • 002 Arithmetic Expressions with Shell
  • 003 Automating Folder Creation with Shell
  • 004 Quoting in Shell

  • 15 - Permissions
  • 001 Introduction to Permissions in Linux
  • 002 Differences between UID, GID and Shadow
  • 003 File and Dir Permissions
  • 004 Examples with File Permissions
  • 005 After this video youll understand all LINUX Permissions
  • 006 Chmod

  • 16 - Processes in Linux
  • 001 Fundamentals of Processes in System
  • 002 The Magic with PS Aux Command
  • 003 The Magic with TOP Command
  • 004 Foreground and Background Processes
  • 005 From Background to Foreground
  • 006 The Tutorial with Linux Process Signals

  • 17 - Packet Management Systems in Linux
  • 001 Introduction to Packet Management Systems
  • 002 Why we need package management tools
  • 003 Package Management in Linux - Final

  • 18 - Getting Started with Networking
  • 001 Trcrt command
  • 002 Networking with Linux

  • 19 - Non-Volatile Memory Acquisition
  • 001 Collecting Storage Media using FKT
  • 002 Using Linux for Non-Volatile Memory Acquisltion
  • 003 Linux Image File splitting
  • 004 Verifying Hash Values
  • 005 GYMGR

  • 20 - Analysis of Storage
  • 001 A1-Image-Analysis-using-FRMT-Part-1.txt
  • 001 Image Analysis using FRMT - Part 1
  • 002 Storage Analysis with SLCPL
  • 003 Storage Analysis with BLK EXT

  • 21 - Networking Training for Digital Forenslcs
  • 001 The TCPIP Couse Part 1
  • 002 The TCPIP Couse Part 2

  • 22 - Mobile Forensics
  • 001 Fundamentals of Mobile Forensics
  • 002 Android Forensics and IOS Forensics
  • 003 Android Root

  • 23 - Memory Analysis with Volatility
  • 001 Introduction to Volatility Framework
  • 002 A2.txt
  • 002 Downloading and Installing Volatility
  • 003 Downloading and Unrar Sample Images for Volatility
  • 004 Volatility Plugins - Part 1
  • 005 A5.txt
  • 005 Volatility Plugins Part 2 - Network Analysis
  • 006 A6.txt
  • 006 Network Analysis
  • 007 A7.txt
  • 007 DLL Analysis
  • 008 A8.txt
  • 008 Volatility Registry Analysis
  • 009 A9.txt
  • 009 Password Extraction and Timeliner Plugin
  • 010 A10.txt
  • 010 Volatility Plugins Part 3
  • 011 A11.txt
  • 011 Analysis of the Malware Using Volatility
  • 012 DLL and Memory Dump using Volatility
  • 013 EXE Dump and Last lecture of section
  • 014 DONE
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 26787
    حجم: 7192 مگابایت
    مدت زمان: 811 دقیقه
    تاریخ انتشار: ۲۷ آذر ۱۴۰۲
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید