Price: 4.00 USD| Size:3.66 GB | Duration : 7.31 Hours | 44Lessons |
BRAND : Expert TRAINING | ENGLISH | INSTANT DOWNLOAD
Digital Forensic for Pentesters Hands-On Learning Online Course & PDF Guides
What you'll learn
- How to forensically image devices.
- How to recover deleted data from various operating systems.
- How to produce professional and legal digital forensic reports.
- How to properly handle digital media before and during investigations.
- How to utilize various forensic tools for digital forensic investigations.
- Analyze and reverse engineer software and malware.
Requirements
- Good working knowledge of a computer.
- Good familiarity with Linux and Windows.
- Good working knowledge of networking.
- Good knowledge of pentesting basics.
Description
Digital forensics is becoming very important in Cyber Security to detect and backtrack Black Hat Criminals. It is essential to remove Hackers’ malicious backdoors/malware and trace them back to avoid possible future incidents. Digital forensics is becoming very important in Cyber Security to detect and backtrack Black Hat Criminals. Digital forensics is essential to remove Hackers’ malicious backdoors/malware and trace them back to avoid possible future incidents.This course acts as a digital forensics’ primer for pentesters and cybersecurity professionals wanting to expand their knowledge and add additional tools and skills to their resumes.Please watch the course overview before enrolling. Hands-on, applied learning is not for everyone. This course is not for you if you are looking for a PowerPoint-driven course where students watch videos, download PDF files, and take notes. There are plenty of lecture-driven courses, but this is not one of them.Make sure you understand the difference between watching and applying.The course is an excellent primer for anyone considering a career in digital forensics. It's important to understand the difference between digital forensics and computer security.This course will consist of video tutorials and lab files that demonstrate the concepts of digital forensics.This course is designed for anyone interested in digital forensics as it relates to pentesting and ethical hacking.
Who this course is for:
- Pentesters interested digital forensic investigations.
Video Lessons Details01.01-course overview
02.01-downloading iso and ova file for virtualbox
02.02-create a virtual install of csi linux 2021.2
02.03-create a kali live (forensic mode) vm using virtualbox
02.04-create a virtual install kali image using virtualbox
02.05-create virtual install of windows 10 using virtualbox
02.06-create virtual install of metasploitable2 using virtualbox
03.01-video and lab-getting started with autopsy
03.02-video and lab-simulate creating a disk image for a forensic analysis
03.03-video and lab-examining a forensic disk image using autopsy
04.01-video and lab-installing the webmap-nmap dashboard
05.01-video and lab-conducting osint using csi linux investigator
05.02-video and lab-find social media accounts using sherlock
05.03-video-osint framework-overview
06.01-video and lab-preparing csi investigator to use shodan
06.02-video and lab-using shodan to find vulnerable devices
06.03-video and lab-using shodan to search for vulnerable databases
07.01-video-attaching an external usb device in kali
07.02-video and lab-acquiring a forensic copy of the windows registry
07.03-video and lab-analyzing the windows registry for evidence
07.04-video and lab-dumping wi-fi credentials using netsh
07.05-video and lab-email header analysis
07.06-video and lab-using shellbags to view hidden or deleted folders
07.07-video and lab-extracting thumbnail images from a suspects machine
07.08-video and lab-memory forensics using the volatility framework
08.01-video and lab-install ghidra on csi linux
08.02-video and lab-introduction to using ghidra
08.03-video and lab-reverse engineering crackme0x00 using ghidra
08.04-video and lab-reverse engineering crackme0x05 using ghidra
08.05-video and lab-analyzing the wannacry killswitch using ghidra
09.01-video and lab-using steghide to hide and extract data
09.02-video and lab-using the exiftool to read and write exif tags
10.01-video-overview of wireshark 3.2
10.02-video-wireshark capture options
10.03-video-wireshark toolbar icons
10.04-video and lab-installing a wireless adapter in kali
10.05-video and lab-hacking a wireless network using kali linux
10.06-video-capturing wireless traffic using wireshark
10.07-video and lab-capturing a 3-way tcp handshake using wireshark
11.01-video and lab-ctf lab build for ha forensics
11.02-video and lab-capture flag 1
11.03-video and lab-capture flag 2
11.04-video and lab-capture flag 3
11.05-video and lab-capture flag 4
9781803231969 Code.zip
Digital Forensic for Pentesters Hands-On Learning Online Course & PDF Guides
You can Instant Download a PDF file
After successful payment ,
This PDF File Contains Course Download links
You can Download This Course immediately from click that Links.