This video based Computer Forensics training course expert Ric Messier will teach you how to get started in this industry. Computer Forensics is a broad topic that touches on many different skills, all specific to answering legal or investigative questions in relation to a computer. Ric will give you an overview of the skills you will need in order to work in this highly technical field. Because Computer Forensics is a broad field, this course covers a lot …
Computer Forensics
Video description
This video based Computer Forensics training course expert Ric Messier will teach you how to get started in this industry. Computer Forensics is a broad topic that touches on many different skills, all specific to answering legal or investigative questions in relation to a computer. Ric will give you an overview of the skills you will need in order to work in this highly technical field. Because Computer Forensics is a broad field, this course covers a lot of topics, from preparing for an investigation, to ethics, to evidence acquisition, being an expert witness and legal vs. corporate investigations. You will learn about forensic tools and how they are used, such as ProDiscover, FTK, and EnCase. This video tutorial covers wireless network investigations, malware and collecting network evidence. You will also learn about UNIX, Windows, Linux and Mac OS, in order to understand where to look for and recover evidence from. By the conclusion of this computer based tutorial for Computer Forensics, you will have a clear understanding of what it takes to be a computer forensics investigator, and the tools and techniques available to you to find the evidence you will be looking for.
Executable Types And Structure: Unix-Based
00:10:24
Disk Partitions
00:07:16
Image Acquisition
Image Formats
00:04:11
Image Acquisitions Under Linux
00:06:21
Image Acquisitions Under Windows
00:05:45
Volatile Information
00:11:25
Data Recovery
00:06:45
Hard Drives
00:05:55
Network Acquisitions
OSI Reference Model
00:07:58
TCP/IP
00:08:29
Network Attacks
00:07:57
Reasons For Network Acquisitions
00:07:45
Man In The Middle Attacks
00:07:31
Capturing Traffic
00:09:09
NetworkMiner
00:06:55
Other Network Tools
00:08:57
Wireless Networking
00:07:41
Wireless Tools
00:11:58
Firewalls And Their Uses
00:09:48
Intrusion Detection Systems
00:06:58
Data Spaces
Alternate Data Streams
00:08:29
Deleted Files
00:07:21
Hidden Partitions
00:04:20
Slack Space And Swap File
00:09:50
Registry
00:11:47
Virtual Memory
00:08:58
System Recovery Checkpoints: Windows
00:03:14
Audit Logs And Settings
00:09:03
Data Recovery
Graphics Files
00:09:26
E-Mail
00:08:17
Internet: Cache, Cookies, Etc.
00:09:54
Metadata
00:10:27
Log Files
00:06:43
Steganography
00:03:50
Steganography Techniques: Images And Video
00:05:33
Steganography Techniques: Audio And Documents
00:05:24
Steganalysis
00:07:32
Compression
00:05:44
Virtual Machines
Virtual Machines
00:12:44
Checkpoints
00:05:25
Data Formats
00:06:34
Hypervisors
00:05:04
Mobile Forensics
IOS
00:04:56
Android
00:07:27
Symbian OS
00:03:25
Tools
00:07:51
Memory Considerations
00:04:08
SIM Cards
00:03:25
Malware Forensics
Malware Forensics
00:04:34
Static Malware Analysis
00:08:41
Dynamic Malware Analysis
00:08:38
About Me
About Me
00:02:58
Start your Free Trial Self paced Go to the Course We have partnered with providers to bring you collection of courses, When you buy through links on our site, we may earn an affiliate commission from provider.
This site uses cookies. By continuing to use this website, you agree to their use.I Accept