Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Complete Digital Forensics for Pentesters
01 Course Overview
001 Course Overview (5:45)
02 Building Your Forensics Lab Environment Using VirtualBox
002 Video and lab - Installing CSI Linux (12:30)
003 Video and Lab - Creating a Kali Live (Forensic Mode) VM Using VirtualBox (5:32)
004 Video and lab - Create a Virtual Install Kali Image Using VirtualBox (7:10)
005 Video and Lab - Create Virtual Install of Windows 10 Using VirtualBox (15:40)
006 Video and Lab - Install Additional Forensic Tools Using Katoolin3 (9:54)
03 Using Kali Forensic Mode and Autopsy
007 Video and Lab - Simulate Creating a Disk Image for a Forensic Analysis (10:39)
008 Video and Lab - Examining a forensic Disk Image Using Autopsy (12:15)
04 Digital Forensics Case Management
009 Video and Lab -Digital Forensics Using Autopsy Part I (11:09)
010 Video and Lab - Digital Forensics Using Autopsy Part II (7:18)
011 Video and Lab - Installing the WebMap-Nmap Dashboard (11:54)
05 Open-source intelligence (OSINT)
012 Video and Lab - Conducting OSINT Using CSI Linux Investigator (8:22)
013 Video and Lab - Find Social Media Accounts Using Sherlock (6:55)
06 Computer Forensics
014 Video - Attaching an External USB Divice in Kali (7:13)
015 Video and lab - Memory Forensics Using the Volatility Framework (18:23)
07 Using Shodan to Search for Vulnerable devices
016 Video and Lab - Preparing CSI Investigator to Use Shodan (6:26)
017 Video and Lab - Using Shodan to Find Vulnerable Devices (15:32)
018 Video and lab - Using Shodan to Search for Vulnerable Databases (8:06)
08 Stenography
019 Video and Lab - Using Steghide for Hiding and Extracting Data (11:12)
020 Video and Lab - Using the EXIFtool to Read and Write EXIF Tags (9:49)
09 Network forensics Using Wireshark
021 Video - Overview of Wireshark 3.2 (10:36)
022 Video - Wireshark Capture Options (7:20)
023 Wireshark Toolbar Icons (3:31)
024 Video and Lab - Capturing a 3-way TCP Handshake Using Wireshark (4:52)
025 Video and Lab - Installing a Wireless Adapter in Kali (9:05)
026 Video and Lab - Hacking a Wireless Network Using Kali Linux (14:11)
027 Video - Capturing Wireless Traffic Using Wireshark (5:06)
10 Practice What You Have learned
028 Video and Lab - CTF Lab Build for HA_ Forensics (11:16)
029 Video and lab - Capture flag #1 (11:52)
030 Video and lab - Capture flag #2 (10:01)
031 Video and lab - Capture flag #3 (19:35)
032 Video and lab - Capture flag #4 (8:30)
Teach online with
018 Video and lab - Using Shodan to Search for Vulnerable Databases
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock