Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Computer Forensics & Investigation
Welcome! Meet your Hero And Step Ahead To Become SUPERHERO
welcome message (1:09)
Introduction To Computer Forensics Or Digital Forensics
what is Digital Foreniscs (3:54)
Process of digital forenisc (8:33)
Inevitability During Computer Forensics Investigation : Legal Issues
coc (3:07)
write blockers (1:29)
regshot (5:29)
Imaging/Acquisition of Operating System
FTK1 (4:55)
FTK imager image pendrive (10:56)
Computer Forensics Lab Setup
Install Kali Linux (15:13)
Kali Linux Live Installition (3:36)
Digital Forensics Investigation : Analysis of Acquired Image
OS Forensics (5:43)
Hash verify (6:27)
OS - Forenisc case (11:17)
Name Search- os foreniscs (3:22)
bulk extractor (8:15)
foremost (5:13)
Browser Forensics
web browser (10:54)
Multimedia Forensics
Stegnography 1 (12:35)
stegnography 2 (4:36)
photo forensics (7:20)
Tacking RAM Dump & Volatile Memory Analysis
dump it (3:42)
Volatility (9:09)
Anti-Forensics Techniques & Detection
1 Anti-Forensics (5:14)
anti foreniscs techniques (6:02)
Anti-Forensics CCleaner (10:29)
Anti -forensics photo forensic (8:55)
BONUS : Cyber Crime Investigation
website related crime (10:56)
Teach online with
Stegnography 1
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock