Companies Home Search Profile

Cybersecurity Foundations: Computer Forensics

Focused View

Jungwoo Ryoo

2:40:52

12 View
  • 01 - Computer forensics.mp4
    00:46
  • 02 - What you should know.mp4
    00:50
  • 01 - Definition and goals of computer forensics.mp4
    01:20
  • 02 - History.mp4
    03:20
  • 03 - Types of investigations.mp4
    02:13
  • 04 - Tools.mp4
    02:49
  • 05 - Legal implications.mp4
    03:03
  • 06 - Current and future trends.mp4
    03:16
  • 07 - Challenges.mp4
    03:29
  • 08 - Anti-forensics techniques.mp4
    03:38
  • 09 - Compliance and forensics.mp4
    02:38
  • 10 - Cybersecurity and forensics.mp4
    02:16
  • 01 - Specializations in computer forensics.mp4
    04:18
  • 02 - Network forensics.mp4
    03:11
  • 03 - Operating system forensics.mp4
    03:49
  • 04 - Web forensics.mp4
    03:37
  • 05 - Cloud forensics.mp4
    03:22
  • 06 - Malware forensics.mp4
    03:40
  • 07 - Mobile forensics.mp4
    03:17
  • 08 - Email forensics.mp4
    03:56
  • 09 - Certifications.mp4
    01:58
  • 01 - Tools and knowledge requirements.mp4
    02:08
  • 02 - Hardware.mp4
    02:44
  • 03 - Software.mp4
    02:27
  • 04 - Understanding hexadecimal numbers.mp4
    04:12
  • 05 - Using a hex editor.mp4
    03:19
  • 06 - Understanding offset.mp4
    01:56
  • 07 - Forensics OS distributions.mp4
    03:52
  • 08 - Challenge Hex editor.mp4
    00:40
  • 09 - Solution Hex editor.mp4
    01:10
  • 01 - Understanding file systems.mp4
    05:13
  • 02 - Understanding the boot sequence.mp4
    03:00
  • 03 - Understanding disksolid-state drives.mp4
    02:56
  • 04 - Understanding the master boot records (MBR).mp4
    01:38
  • 05 - Understanding Partitioning.mp4
    01:49
  • 06 - Challenge Partitioning a USB drive.mp4
    00:53
  • 07 - Solution Partitioning a USB drive.mp4
    00:59
  • 01 - Evidence preservation approaches.mp4
    02:53
  • 02 - Understanding the role of write blockers.mp4
    01:55
  • 03 - Using a software write blocker.mp4
    02:26
  • 04 - Using hardware write blockers.mp4
    02:40
  • 05 - Understanding hashing.mp4
    01:21
  • 06 - Hashing algorithms.mp4
    01:24
  • 07 - Case Study Hashing in FTK Imager.mp4
    03:47
  • 08 - Understanding mounting.mp4
    05:42
  • 09 - Mounting manually.mp4
    04:06
  • 10 - Challenge Hashing in Kali.mp4
    01:33
  • 11 - Solution Hashing in Kali.mp4
    01:13
  • 01 - Data acquisition approaches.mp4
    01:44
  • 02 - Static acquisition with open-source tools.mp4
    03:39
  • 03 - Static acquisition case study with dd.mp4
    02:57
  • 04 - Static acquisition case study with dcfldd.mp4
    01:53
  • 05 - Live acquisition case study with a commercial tool.mp4
    00:40
  • 06 - Challenge Live acquisition with a memory dump file.mp4
    00:29
  • 07 - Solution Live acquisition with a memory dump file.mp4
    00:47
  • 01 - Forensic data analysis.mp4
    02:36
  • 02 - Indexing.mp4
    01:32
  • 03 - Searching.mp4
    03:54
  • 04 - Generating a Report.mp4
    02:30
  • 05 - Case Study Hex editor analysis of a file with a wrong extension.mp4
    02:56
  • 06 - Hex editor analysis of a bit-shifted file.mp4
    02:34
  • 07 - Case Study Steganography.mp4
    03:19
  • 01 - Next steps.mp4
    00:40
  • Description


    Computer forensics is used to find legal evidence in computers, mobile devices, or data storage units. This course covers all the technical essentials for up-and-coming digital forensics professionals. Instructor Jungwoo Ryoo reviews the goals of computer forensics, the types of investigations it's used for, a forensic investigator's typical tool set, and the legal implications of this type of work.

    Explore different specializations currently available in the field to assess your career prospects as an investigator. Jungwoo shows you how to prepare for an investigation, acquire data, ensure data is kept in its original state with software and hardware write-blockers, analyze the data, and generate a report of your findings. Along the way, you’ll discover options for both open-source and commercial software to help find the best tool for your needs and your budget.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Jungwoo Ryoo
    Jungwoo Ryoo
    Instructor's Courses
    I aspire to be a servant leader with compassion. I have the honor and pleasure of serving as the Chancellor and Chief Academic Officer (CAO) at Penn State DuBois. I am blessed with my academic appointment as Professor of Information Sciences and Technology. My research interests include information assurance and security, software engineering, computer networking, and data science. In addition to my core academic research, I conduct research in innovative learning environments (ILEs) to promote justice, equity, diversity, and inclusion (JEDI) in Science, Technology, Engineering, and Math (STEM) higher education. Many of my research projects have been funded by state and federal government agencies. I received more than 1.5 million dollars in total external funding. I have substantial industry experience architecting and implementing secure, high-performance software solutions for large-scale network management systems. Specialties: Software Engineering, Cybersecurity, Information Assurance, Networking, and Data Science
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 63
    • duration 2:40:52
    • English subtitles has
    • Release Date 2024/02/10