Video description
Digital forensics is becoming very important in cyber security to detect and backtrack Black Hat criminals. It is essential to remove hackers’ malicious backdoors/malware and trace them back to avoid possible future incidents.
This course acts as digital forensics’ primer for pentesters and cybersecurity professionals wanting to expand their knowledge and add advanced tools and skills to their resumes.
Make sure you understand the difference between watching and applying.
The course is an excellent primer for anyone considering a career in digital forensics. It’s important to understand the difference between digital forensics and computer security.
What You Will Learn
- Learn how to forensically image devices
- Learn how to recover deleted data from various operating systems
- Learn how to produce professional and legal digital forensic reports
- Learn how to properly handle digital media before and during investigations
- Learn how to utilize various forensic tools for digital forensic investigations
- Learn how to analyze and reverse engineer software and malware
Audience
This course is for pentesters interested in digital forensic investigations and for anyone interested in digital forensics as it relates to pentesting and ethical hacking.
About The Author
Cliff Krahenbill: Cliff Krahenbill, known as Professor K, is a technology professional and online instructor. He received his Master of Science degree in Cybersecurity from UMUC in 2015 and a Master of Science degree in Information Technology from Capella University in 2007. Professor K has been working in the field of technology since 1998 as a Microsoft support technician, Microsoft certified trainer, technology support specialist, senior network technology consultant, IT auditor, and most recently, as the owner and operator of his own technology firm, CLK Technology Solutions, located in Tucson, Arizona.
Professor K’s expertise in technology lies in designing, building, and supporting network infrastructures and network security. He has been teaching online courses since 2008 and conducts online classes for universities and colleges. He holds numerous technology certifications, which include the following:
MCTS: Windows Server 2008 Active Directory, Configuration
MCTS: Windows Server 2008 Applications Infrastructure, Configuration
MCTS: Windows Server 2008 Network Infrastructure, Configuration
A+, Net+, Security+
He spends his spare time working in his woodshop and providing free technical support to the local retirement community in Tucson, Arizona.
Table of contents
- Chapter 1 : Course Overview
-
Chapter 2 : Building Your Forensics Lab Environment Using VirtualBox
- Downloading ISO and OVA File for VirtualBox
- Create a Virtual Install of CSI Linux 2021.2
- Create a Kali Live (Forensic Mode) VM Using VirtualBox
- Create a Virtual Install Kali Image Using VirtualBox
- Create Virtual Install of Windows 10 Using VirtualBox
- Create Virtual Install of Metasploitable2 Using VirtualBox
- Chapter 3 : Using Kali Forensic Mode and Autopsy
- Chapter 4 : Digital Forensics Case Management
- Chapter 5 : Open-Source Intelligence (OSINT)
- Chapter 6 : Using Shodan to Search for Vulnerable Devices
-
Chapter 7 : Computer Forensics
- Video - Attaching an External USB Device in Kali
- Video and Lab – Acquiring a Forensic Copy of the Windows Registry
- Video and Lab – Analyzing the Windows Registry for Evidence
- Video and Lab - Dumping Wi-Fi Credentials Using netsh
- Video and Lab - Email Header Analysis
- Video and Lab - Using Shellbags to View Hidden or Deleted Folders
- Video and Lab - Extracting Thumbnail Images From a Suspect's Machine
- Video and lab - Memory Forensics Using the Volatility Framework
- Chapter 8 : Reverse Engineering and Malware Analysis
- Chapter 9 : Stenography
-
Chapter 10 : Network Forensics Using Wireshark
- Video - Overview of Wireshark 3.2
- Video - Wireshark Capture Options
- Video - Wireshark Toolbar Icons
- Video and Lab - Installing a Wireless Adapter in Kali
- Video and Lab - Hacking a Wireless Network Using Kali Linux
- Video - Capturing Wireless Traffic Using Wireshark
- Video and Lab - Capturing a 3-way TCP Handshake Using Wireshark
- Chapter 11 : Practice What You learned
Product information
- Title: Digital Forensics for Pentesters - Hands-On Learning
- Author(s):
- Release date: September 2021
- Publisher(s): Packt Publishing
- ISBN: 9781803231969
You might also like
book
Digital Forensics and Internet of Things
DIGITAL FORENSICS AND INTERNET OF THINGS It pays to be ahead of the criminal, and this …
book
Digital Forensics with Kali Linux - Second Edition
Take your forensic abilities and investigation skills to the next level using powerful tools that cater …
book
A Practical Guide to Digital Forensics Investigations, 2nd Edition
THE DEFINITIVE GUIDE TO DIGITAL FORENSICSNOW THOROUGHLY UPDATED WITH NEW TECHNIQUES, TOOLS, AND SOLUTIONS Complete, practical …
book
Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations
Become an effective cyber forensics investigator and gain a collection of practical, efficient techniques to get …