Learn digital forensics and be professional digital forensics investigator. Learn computer forensics and investigate NEW


What you will learn

Digital Forensics Fundamentals

Creating Digital Forensics Lab

Investigate Volatile and Non-Volatile Memory

Data Acquisition

Linux

Cyber Security

TCP/IP

Digital forensics LAW

Networking

Malware Analysis

Evidence Analysis

Debugging

Mobile Forensics

Web Browser Forensics

and other awesome topics ->

Description

Digital forensics is a branch of forensic science encompassing the recovery, investigation, examination and analysis of material found in digital devices, often in relation to mobile devices and computer crime. 

The term digital forensics was originally used as a synonym for computer forensics but has expanded to cover investigation of all devices capable of storing digital data.

 With roots in the personal computing revolution of the late 1970s and early 1980s, the discipline evolved in a haphazard manner during the 1990s, and it was not until the early 21st century that national policies emerged.


Digital forensics investigations have a variety of applications. The most common is to support or refute a hypothesis before criminal or civil courts. 

Criminal cases involve the alleged breaking of laws that are defined by legislation and that are enforced by the police and prosecuted by the state, such as theft and assault against the person. 

Civil cases on the other hand deal with protecting the rights and property of individuals (often associated with family disputes) but may also be concerned with contractual disputes between commercial entities where a form of digital forensics referred to as electronic discovery (ediscovery) may be involved


During the 1980s very few specialized digital forensic tools existed, and consequently investigators often performed live analysis on media, examining computers from within the operating system using existing sysadmin tools to extract evidence. 

This practice carried the risk of modifying data on the disk, either inadvertently or otherwise, which led to claims of evidence tampering. A number of tools were created during the early 1990s to address the problem.


Digital forensics is commonly used in both criminal law and private investigation.

 Traditionally it has been associated with criminal law, where evidence is collected to support or oppose a hypothesis before the courts. As with other areas of forensics this is often a part of a wider investigation spanning a number of disciplines. 

In some cases, the collected evidence is used as a form of intelligence gathering, used for other purposes than court proceedings (for example to locate, identify or halt other crimes). As a result, intelligence gathering is sometimes held to a less strict forensic standard.


English

language

Content

Introduction

Introduction to Digital Forensics

How to be Digital Forensics Investigator

What is Cyber Crime ?

Digital Forensics Fundamentals

Digital Forensics Categories

Digital Evidence

Evolution of Computers

Anti-Forensics

Storage Devices

Volatile and Non-Volatile Memory Types

SSD

CD

HDD

Building Digital Forensics Lab

Digital Forensics Lab Requirements

Installing Android Emulator

Installing FTK Manager

Installing Digital Forensics Lab

Digital Forensics Tools and OS

Installing Kali Linux – Part 1

Cybersecurity Fundamentals

Cybersecurity Fundamentals

VPN

Firewall

DMZ

Windows Firewall Explanation

Linux and Technical Training

Linux Working With Files – Part 1

Linux Working With Files – Part 2

Working with Processes – Part 1

Working With Processes – Part 3

Linux Filtering Processes

Linux – Filesystem Part 1

Linux – Filesystem Part 2

Linux – Working With Archive Files 1

Linux – Working With Archive Files 2

Digital Evidence Acquisition Techniques

Metadata

Evidence Acquisition File Types

Digital Forensics Law Enforcement

Digital Forensics Law Enforcement

Incident Response

Incident Response Fundamentals

Evidence Collection

Hashing Algorithms

Storage Acquisition

Windows RAM Acquisition

Magnet Memory Acquisition

Windows File Hashing without any Programs

Non-Volatile Memory Acquisition P2

Storage Acquistion with Splitting – P3

Hashing Storage Device

FTK Imager Windows Storage Acquisition

Networking Fundamentals

Networking – Beginner Part 1

Networking – Beginner Part 2

Networking – Intermediate Part 1

Networking – Intermediate Part 2

Networking – Advanced Part 1

Evidence Analysis

Windows Storage Analysis Volatility

Windows RAM Analysis Volatility

Volatility Malware Infected Storage Analysis

Autospy

Malware Identification

Malware Identification Fundamentals

Malware Persistence

Malware Identification Tools

Malware Analysis

Cridex

Infected Memory Analysis

R2D2 Infected Memory Analysis

Debugging Infected Program

Mobile Forensics

Android Root

Mobile Forensics – Part 1

Mobile Forensics – Part 2

Web Browser Forensics

Web Browser Forensics – Practical Example.

Enroll Now

Post a Comment

Previous Post Next Post