Autoplay
Autocomplete
HTML5
Flash
Player
Speed
Previous Lecture
Complete and continue
Digital Forensics and Cyber Crime with Kali Linux Fundamentals
Introduction
Digital Forensics and Cyber Crime with Kali Linux Fundamentals: Introduction (2:22)
Lesson 1: Introduction to Digital Forensics
Learning objectives (0:41)
1.1 Why forensics (27:04)
1.2 Cyber crime (33:01)
1.3 Introduction to digital forensics (15:43)
Summary (1:32)
Lesson 2: Digital Forensic Investigations
Learning objectives (1:05)
2.1 Overview of digital forensics (16:12)
2.2 Outsourcing vs. providing in-house forensic services (11:09)
2.3 Search and seizure overview (14:35)
2.4 Basic forensics lab (4:25)
2.5 Forensic tool overview (6:59)
2.6 Collecting evidence (9:42)
2.7 Steganography and images (9:00)
2.8 Preserving and reviewing digital evidence (4:15)
2.9 Packaging evidence (1:01)
2.10 Forensic reports (4:17)
Summary (1:08)
Lesson 3: Getting Started with a Forensic Linux Workstation
Learning objectives (0:29)
3.1 Downloading Kali Linux (5:54)
3.2 Creating and running Kali Linux (7:27)
3.3 Running Kali Linux Virtual Machine (2:30)
3.4 Updating and installing Forensic Packages (4:39)
3.5 Kali Linux as a Forensic Workstation (6:48)
Summary (0:53)
Lesson 4: Duplication and Data Protection
Learning objectives (0:36)
4.1 Pre duplication (13:31)
4.2 Forensic Images (39:10)
4.3 Image Types (15:59)
4.4 RAID (7:10)
4.5 Kali Disk Duplication (13:52)
4.6 Windows Disk Duplication (5:10)
Summary (7:48)
Lesson 5: Collecting and Preserving Evidence
Learning objectives (0:43)
5.1 Introduction to Collecting and Preserving (9:43)
5.2 Hashing (15:49)
5.3 Preserving Data (19:31)
5.4 Linux Tools (8:48)
Summary (4:14)
Lesson 6: Cracking Passwords
Learning objectives (0:20)
6.1 Password cracking concepts (5:40)
6.2 Password cracking tools (11:38)
6.3 Windows passwords (0:42)
6.4 Linux / OSX passwords (3:17)
Summary (0:33)
Lesson 7: Windows Forensics
Learning objectives (0:25)
7.1 File system overview (4:41)
7.2 Shortcut files (1:07)
7.3 Recycle bin (1:13)
7.4 Info and spool files (0:57)
7.5 Registry Part 1 (2:42)
7.6 Registry Part 2 (2:31)
7.7 Registry by OS (0:54)
7.8 Registry Part 3 (0:47)
7.9 Registry Forensics (3:29)
7.10 Registry investigations (2:03)
7.11 FTK registry viewer (2:04)
Summary (0:37)
Lesson 8: Network Forensics
Learning objectives (0:53)
8.1 Networks (15:18)
8.2 Security Tools (13:44)
8.3 Firewalls (20:23)
8.4 Content Filtering (31:38)
8.5 Breach and Honeypots (20:33)
8.6 Network Access Control (21:20)
8.7 Netflow (17:05)
8.8 Data Loss Prevention (6:28)
8.9 Network Attacks (39:08)
8.10 Detecting Threats (15:21)
8.11 Snort Part 1 (28:13)
8.12 Snort Part 2 (28:27)
8.13 Network Logs (50:21)
Summary (6:58)
Lesson 9: Email Forensics
Learning objectives (0:18)
9.1 Email system and clients (2:09)
9.2 Investigating email (7:41)
9.3 Email forensic tools (10:47)
Summary (0:24)
Lesson 10: Reverse Malware Engineering
Learning objectives (0:26)
10.1 Introduction to malware analysis (4:07)
10.2 Static analysis (5:07)
10.3 Static analysis tools (2:59)
10.4 Static analysis PDF (1:37)
10.5 Dynamic analysis (4:50)
Summary (0:24)
Lesson 11: Forensic Case Studies
Learning objectives (0:57)
11.1 Investigating a laptop for HR (11:42)
11.2 Investigating a network breach (8:41)
11.3 Investigating a hard drive from eBay (5:39)
11.4 Complete legal example (12:51)
Summary (5:45)
Summary
Digital Forensics and Cyber Crime with Kali Linux Fundamentals: Summary :00:39 (0:38)
6.4 Linux / OSX passwords
Lecture content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock