Companies Home Search Profile

Digital Forensics and System Hardening For 2024

Focused View

Cyber Security Online Training

4:01:53

0 View
  • 1 -Introduction.mp4
    01:58
  • 2 -Autopsy Introduction.mp4
    01:17
  • 3 -5 Key Terms.mp4
    01:05
  • 4 -Digital Forensic Process.mp4
    01:33
  • 1 -Disk Loading.mp4
    03:57
  • 2 -Analyze Common Locations For Compromise Artifacts.mp4
    08:17
  • 3 -WRR Tool - Export Registry.mp4
    03:06
  • 1 -Introduction- Linux Forensics.mp4
    00:40
  • 2 -5 Important Terms.mp4
    03:21
  • 3 -Creating image with FTK imager.mp4
    02:46
  • 4 -Loading Compromised Machine Disk.mp4
    02:53
  • 5 -Analyze common locations of compromised Artifacts.mp4
    07:07
  • 1 -Introduction- Browsers Forensics.mp4
    02:13
  • 2 -Working of Browser.mp4
    03:15
  • 3 -Analyze Google Chrome.mp4
    02:50
  • 4 -Analyze Mozilla Firefox.mp4
    01:35
  • 1 -Introduction.mp4
    01:55
  • 2 -Loading Hard Drive in Autopsy.mp4
    02:20
  • 3 -Analyze Locations for Evidence.mp4
    12:24
  • 4 -Export Registries.mp4
    04:08
  • 1 -Introduction.mp4
    01:28
  • 2 -Hacking Windows Server.mp4
    12:09
  • 3 -Hardening Windows Server.mp4
    05:59
  • 1 -Introduction.mp4
    00:47
  • 2 -5 Important Terms.mp4
    01:21
  • 3 -Exploit Vulnerabilities.mp4
    09:14
  • 4 -Linux Hardening.mp4
    07:23
  • 1 -Windows 10 - VM.mp4
    08:37
  • 2 -Windows Server - VM.mp4
    03:35
  • 3 -KALI - VM.mp4
    03:52
  • 4 -Commands- I.mp4
    06:10
  • 5 -Commands- II.mp4
    08:06
  • 6 -Commands- III.mp4
    03:03
  • 7 -Commands- IV.mp4
    06:19
  • 8 -Commands- V.mp4
    05:01
  • 9 -Commands- VI.mp4
    01:22
  • 10 -Commands- VII.mp4
    03:16
  • 11 -Commands- VIII.mp4
    13:11
  • 12 -Commands- IX.mp4
    02:31
  • 13 -Commands- X.mp4
    07:45
  • 14 -Additional Information.mp4
    11:18
  • 1 -Lesson 1.mp4
    06:35
  • 2 -Lesson 2.mp4
    00:55
  • 3 -Lesson 3.mp4
    08:20
  • 4 -Lesson 4.mp4
    03:37
  • 5 -Lesson 5.mp4
    05:36
  • 6 -Lesson 6.mp4
    04:56
  • 7 -Lesson 7.mp4
    07:27
  • 8 -Lesson 8.mp4
    04:00
  • 9 -Lesson 9.mp4
    02:38
  • 10 -Lesson 10.mp4
    06:42
  • Description


    Learn Digital Forensics and Hardening of WinOS, Server, Linux, WebBrowsers. Learn Autopsy, FTK imager, SQLite, WRR, etc.

    What You'll Learn?


    • Digital Forensics Investigation of WinOS, Server, Linux and Web Browsers.
    • Learn to use professional tools like- FTK imager, Autopsy, SQLite, WRR, etc.
    • Learn Hardening techniques for Windows Server and Linux System.
    • Get access to widely used KALI commands.

    Who is this for?


  • Anyone who want to learn digital forensics and hardening.
  • What You Need to Know?


  • No experience needed. Learn From Scratch.
  • More details


    Description

                              "Digital Forensics and System Hardening For 2024":

    Are you ready to take your forensic investigation skills to the next level? Look no further! The Advanced Forensic Investigation Course is designed to equip you with the knowledge and expertise needed to excel in the world of digital forensics.

    In this comprehensive and hands-on course, we delve deep into the intricacies of Windows 10, Windows Server, web browsers like Chrome and Firefox, and Linux. Our expert instructors will guide you through the entire investigative process, from evidence collection to data analysis, enabling you to build solid forensic cases.

    Through a state-of-the-art training environment, you'll have access to the latest tools and technologies used in the industry. You'll become familiar with tools like FTK Imager, Autopsy, and WRR, mastering their functionalities to uncover hidden evidence, recover deleted files, and extract vital information.

    We explore the advanced techniques specific to Windows 10, Windows Server, and popular web browsers. You'll learn how to navigate complex file systems, analyze browser artifacts, and detect digital footprints left behind by users. This knowledge will enable you to uncover critical insights and build a stronger case.

    Additionally, we dedicate a significant portion of the course to Linux, one of the most prevalent operating systems in today's digital landscape. You'll gain a deep understanding of Linux forensics, including file system analysis, log file examination, and the identification of malicious activities. These skills will position you as a well-rounded forensic investigator capable of handling diverse digital environments.

    We also recognize the importance of system security and offer an in-depth exploration of hardening techniques for Windows Server and Linux Ubuntu. You'll learn how to implement robust security measures, establish effective access controls, and fortify your systems against potential threats. Strengthening your understanding of system hardening will not only enhance your forensic investigations but also empower you to prevent future incidents.

    Enroll today and unlock your potential in the world of digital forensics. Gain the expertise you need to tackle even the most challenging cases with confidence. Become an elite forensic investigator and make your mark in the ever-evolving field of digital investigations. At the end, you will get 2 additional sections, One for Cyber Forensics and Another for Excel.

    Don't miss out on this opportunity. Sign up now and embark on a transformative journey in Advanced Forensic Investigation.

    Who this course is for:

    • Anyone who want to learn digital forensics and hardening.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Cyber Security Online Training
    Cyber Security Online Training
    Instructor's Courses
    Cyber Security Online Training is a group of IT Professionals providing training since 2014, We have taught more than 10000 students. Now we have decided to teach online and udemy is the best platform to start with. We have designed courses for both beginners and working professionals. Join the course and grow your career.See you in class.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 51
    • duration 4:01:53
    • Release Date 2025/03/08

    Courses related to Computer Forensics

    Subtitle
    Incident Response Planning
    Linkedin Learning Jason Dion
    Jason Dion
    Incident Response Planning
    5:37:06
    English subtitles
    04/04/2023
    Subtitle
    AccessData Forensic Toolkit (FTK) Imager