Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Digital Forensics
Module 1: Digital Forensics And SOC, Section 1: Introduction to Forensics
M.1.1.1 Introduction to Digital Forensics (2:00)
M.1.1.2 Case Studies (2:24)
M.1.1.3 CERT, CERT-IN and Cyber Cells (2:45)
M.1.1.4 Legal Issues (3:43)
M.1.1.5 Chain of Custody (0:41)
M.1.1.6 Types of Cyber Crime (9:43)
M.1.1.7 The Basic Forensic Process and the 6 As of Forensics (9:51)
M.1.1.8 Forensics Tools and Techniques (3:00)
M.1.1 Introduction to Forensics (PDF)
Module 2: Digital Forensics And SOC: Disk-based & Log Analysis
M.2.1 Understanding the Hard Disk (36:27)
M.2.2 Disk Imaging (14:15)
M.2.2.A Disk Imaging (Lab) (1:50)
M.2.2.B Understanding the Hard Disk (Lab) (4:38)
M.2.3 Password Cracking (4:49)
M.2.4 Physical Protection of Evidence (1:31)
M.2.5 Log Analysis (2:57)
M.2 Disk-based and Log Analysis (PDF)
Module 3: Digital Forensics And SOC : Malware Analysis
M.3.1 Introduction to Malware Analysis And Malware Types (3:41)
M.3.2 Techniques of Malware Analysis (8:22)
M.3.2.A Techniques of Malware Analysis (Lab) (5:25)
M.3.2.B Techniques of Malware Analysis (Lab) (1:12)
M.3.3 Virus Total (1:46)
M.3 Malware Analysis (PDF)
Module 4: Digital Forensics And SOC: Email, USB & Memory Forensics
M.4.1 Email Forensics (8:28)
M.4.1.A Email Forensics (Lab) (2:45)
M.4.2 USB Forensics (3:30)
M.4.2.A USB Forensics (Lab) (1:46)
M.4.3 Memory Forensics (6:23)
M.4.4 Analyzing Stuxnet with Volatility (8:36)
M.4.4.A Analyzing Stuxnet with Volatility (Lab) (3:58)
M.4.4.B Analyzing Stuxnet with Volatility (Lab) (0:45)
M.4 Email, USB & Memory Forensics (PDF)
Module 5: Digital Forensics And SOC, Section 5: Mobile Forensics
M.5.1 Mobile Forensics and Tools and Techniques (5:42)
M.5.2 Mobile Forensics Challenges (3:01)
M.5.3 Mobile Forensics Methodology, Forensic Imaging and adb Commands (3:29)
M.5.3.A Mobile Forensics Methodology, Forensic Imaging and adb Commands (Lab) (2:02)
M.5 Mobile Forensics (PDF)
Module 6: Digital Forensics And SOC: Network Forensics
M.6.1 Introduction to Network Forensics (10:14)
M.6.1.A Introduction to Network Forensics (Lab) (6:10)
M.6.2 Wireless and SSL Forensics (2:19)
M.6.3 Internet History Browser Forensics (1:00)
M.6.3.A Internet History Browser Forensics (Lab) (1:35)
M.6 Network Forensics (PDF)
Module 7: Digital Forensics And SOC: Live Forensics
M.7.1 Windows Live Forensics (5:34)
M.7.1.A Windows Live Forensics (Lab) (4:05)
M.7.2 Linux Live Forensics (4:22)
M.7.2.A Linux Live Forensics (Lab) (2:57)
M.7 Live Forensics (PDF)
Module 8: Digital Forensics And SOC: Incident Response
M.8.1 Incident Response (2:44)
M.8.2 Components of Incident Response and Incident Response Team (3:56)
M.8.3 Incident Response Methodology and Sysinternals (10:26)
M.8 Incident Response (PDF)
Digital Forensics and SOC Quiz
Test Your Learning: Easy
Test Your Learning: Medium
Test Your Learning: Difficult
M.3 Malware Analysis (PDF)
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock