Log in / Sign Up
Download New All Exclusive Library
Courses
Become an Instructor
Categories
Art & Humanities
Digital Marketing
Finance & Accounting
Graphic Design
IT and Software
Personal Development
Photohraphy
Sales Marketing
Social Sciences
Web Development
All Levels
Beginner
Intermediate
Expert
Download New All Exclusive Library
Courses
Become an Instructor
Log in
Course Content
1. Introduction
0/2
01 – Learning computer forensics
01:00
02 – What you should know
01:53
2. Understanding Computer Forensics
0/10
01 – Goals of computer forensics
01:24
02 – History
03:07
03 – Types of investigations
02:07
04 – Tools
02:50
05 – Legal implications
03:18
06 – Current and future trends
03:31
07 – Challenges
03:37
08 – Anti-forensics techniques
03:35
09 – Compliance and forensics
02:40
10 – Cybersecurity and forensics
02:23
3. Careers
0/9
01 – Specializations in computer forensics
04:16
02 – Network forensics
03:34
03 – Operating system forensics
03:51
04 – Web forensics
03:50
05 – Cloud forensics
03:48
06 – Malware forensics
04:07
07 – Mobile forensics
03:28
08 – Email forensics
04:09
09 – Certifications
02:30
4. Preparing for an Investigation
0/7
01 – Tools and knowledge requirements
02:05
02 – Hardware
02:39
03 – Software
02:16
04 – Understanding hexadecimal (hex) numbers
03:31
05 – Using a hex editor
03:53
06 – Understanding an offset
02:15
07 – Forensics OS distributions
03:45
5. File System Fundamentals
0/5
01 – Understanding file systems
04:23
02 – Understanding the boot sequence
02:40
03 – Understanding disk drives
02:24
04 – Understanding the master boot record (MBR)
01:48
05 – Understanding partitioning
02:19
6. Preserving Data
0/9
01 – Evidence preservation approaches
02:49
02 – Understanding the role of write blockers
02:14
03 – Using a software write blocker
04:08
04 – Using hardware write blockers
03:00
05 – Understanding hashing
04:25
06 – Hashing algorithms
01:28
07 – Hashing in FTK Imager
03:51
08 – Understanding mounting
05:31
09 – Mounting manually
04:03
7. Acquiring Data
0/6
01 – Data acquisition approaches
02:15
02 – Static acquisition with open-source tools
03:33
03 – Creating split-disk image files with dd
03:24
04 – Static acquisition with dcfldd
03:29
05 – Live acquisition with a commercial tool
02:29
06 – Memory dump analysis with volatility
03:44
8. Analyzing Data
0/7
01 – Forensic data analysis
02:41
02 – Indexing
01:44
03 – Searching
04:22
04 – Generating a report
02:19
05 – Hex editor analysis of a file with a wrong extension
03:21
06 – Hex editor analysis of a bit-shifted file
02:09
07 – Steganography
02:58
9. Conclusion
0/1
01 – Next steps
01:03
Cybersecurity Foundations Computer Forensics Jungwoo Ryoo
Pause
Play
% buffered
00:00
00:00
Unmute
Mute
Disable captions
Enable captions
Settings
Captions
Disabled
Quality
0
Speed
Normal
Captions
Go back to previous menu
Quality
Go back to previous menu
Speed
Go back to previous menu
0.5×
0.75×
Normal
1.25×
1.5×
1.75×
2×
4×
PIP
Exit fullscreen
Enter fullscreen
Play
Exercise Files
01-Learning-computer-forensics.en_.srt
Size: 1.40 KB
0%
Complete
Mark as Complete