Companies Home Search Profile

Digital Forensics Masterclass : Forensic Science 2023 DFMC+

Focused View

OCSALY Academy | 160.000+ Students

13:30:31

32 View
  • 001 Cybercrime Understanding the Threats of the Digital World.mp4
    01:41
  • 002 The Three Faces of Cybercrime Exploring its Types and Methods.mp4
    01:57
  • 003 Digital Forensics 101 Uncovering the Mysteries of Cybercrime Investigations.mp4
    07:05
  • 004 From Phishing to Ransomware Real-World Examples of Cybercrime in Action.mp4
    06:59
  • 001 Unlocking the Categories of Digital Forensics From Cybercrime to Cybersecurity.mp4
    06:27
  • 002 The Ultimate Guide to Computer Forensics Solving Digital Crimes and Uncovering.mp4
    05:18
  • 003 Mobile Forensics Unraveling the Mysteries of Digital Devices.mp4
    06:22
  • 004 Mobile Forensics Tools Exploring the Latest Advances in Digital Forensic Invest.mp4
    06:41
  • 005 Navigating Network Forensics Strategies and Tools for Investigating Digital Era.mp4
    03:38
  • 006 Inside Database Forensics Analyzing the Heart of Digital Evidence.mp4
    07:22
  • 007 Forensics Data Analysis Uncovering Patterns and Trends in Digital Investigation.mp4
    02:24
  • 001 An Exciting Journey through the History of Storage Media.mp4
    06:15
  • 002 Remembering or Forgetting Understanding the Differences between Volatile and No.mp4
    13:01
  • 003 Unraveling the Magic of Magnetic Tape Drives The Backbone of Data Storage.mp4
    02:00
  • 004 The Nostalgic Charm of Floppy Disks A Look into the Iconic Data Storage Medium.mp4
    01:12
  • 005 The Future of Storage How Optical Storage Media Continues to Evolve.mp4
    01:37
  • 006 Unlocking the Power of DVD Understanding the Capabilities of this Revolutionary.mp4
    02:20
  • 007 The Future is Blue Embracing the Capabilities of Blu-ray Technology.mp4
    04:01
  • 001 The Future of Data Storage Exploring the Benefits of Flash Storage Media.mp4
    02:31
  • 002 Unlocking the Power of Portable Data A Guide to USB Flash Drives.mp4
    01:19
  • 003 From Camera to Computer The Versatility of Flash Memory Cards.mp4
    04:17
  • 001 From Megabytes to Terabytes The Evolution of Hard Disk Drives.mp4
    05:42
  • 002 The Next Generation of Data Storage A Deep Dive into Solid State Drives.mp4
    02:57
  • 001 What is network protocol and what it does.mp4
    04:16
  • 002 Layers of TCPIP Model.mp4
    04:10
  • 003 How emails sent and received over internet.mp4
    02:28
  • 004 PDU Explained.mp4
    06:18
  • 005 Basic Use of Switch and Data Transmission.mp4
    05:40
  • 006 2 Networks Talking with Router in Middle.mp4
    04:49
  • 001 Unleashing the Power of the Main Task A Guide to Achieving Success.mp4
    01:39
  • 002 Cracking the Code Understanding Forensics Image File Formats.mp4
    06:24
  • 003 Capturing the Moment Acquiring Volatile Memory for Digital Forensics.mp4
    05:36
  • 001 A1-Resources.txt
  • 001 Building a Strong Foundation Creating Your Own Digital Forensics Lab.mp4
    02:39
  • 002 Ready, Set, Go Getting Started with Cybersecurity and DFIR Fundamentals.mp4
    07:42
  • 003 Going Virtual A Step-by-Step Guide to Installing Virtual Machines.mp4
    08:25
  • 004 Installing Kali The Essential Installation Guide for Penetration Testing.mp4
    07:24
  • 005 Breaking In Installing and Configuring Metasploitable for Advanced DFIR Testing.mp4
    07:49
  • 001 Introduction to Passive Information Gathering.mp4
    02:28
  • 002 Differences Between Recon and Footprinting.mp4
    05:42
  • 003 Understanding Passive Information Gathering and OSINT.mp4
    06:15
  • 004 Introduction to OSINT.mp4
    02:46
  • 005 The Most Important Principles of Recon.mp4
    03:08
  • 006 REAL Offensive OSINT.mp4
    05:17
  • 007 Using One of the most powerful tools SBLSTR for Finding Subdomains.mp4
    03:42
  • 008 USUFY as Osint Tool.mp4
    06:19
  • 009 Finding Deleted,Erased, Hiddent WebPages with OSINT Techniques.mp4
    03:22
  • 010 The Harvester as Osint Tool - Harvesting as Much info as possible.mp4
    06:00
  • 011 Reverse Image Search - Finding all information from image that you need.mp4
    03:40
  • 012 Usage of GHDB.mp4
    06:29
  • 013 Using GHDB Part 2.mp4
    10:09
  • 001 Collecting RAM with MGNT.mp4
    07:36
  • 002 Collecting RAM with FKMT.mp4
    08:34
  • 003 Memory Acquisition with BLKSFT.mp4
    04:27
  • 001 Understanding Linux Commands and Pipes.mp4
    07:24
  • 002 What is a Command.mp4
    03:31
  • 003 Pipeline example #1.mp4
    10:39
  • 004 Weird LS Command.mp4
    03:42
  • 005 Different Linux Commands using with Pipe.mp4
    11:22
  • 001 Understanding key concepts.mp4
    06:54
  • 002 Finding Helpful manuals.mp4
    06:51
  • 003 Linux Directories.mp4
    05:41
  • 004 Linux Directories - Part 2.mp4
    05:41
  • 001 The bridge between You and Shell.mp4
    07:27
  • 002 LS Command.mp4
    02:27
  • 003 RD vs APD.mp4
    09:05
  • 004 Filtering LS.mp4
    07:43
  • 005 CP Command.mp4
    06:36
  • 006 Tab Auto-completion.mp4
    03:31
  • 007 SYM AND HRD Link Files.mp4
    12:06
  • 008 Manipulating Files.mp4
    06:19
  • 001 Introduction to Shell and Expansion.mp4
    06:56
  • 002 Arithmetic Expressions with Shell.mp4
    04:16
  • 003 Automating Folder Creation with Shell.mp4
    08:16
  • 004 Quoting in Shell.mp4
    09:33
  • 001 Introduction to Permissions in Linux.mp4
    04:54
  • 002 Differences between UID, GID and Shadow.mp4
    06:18
  • 003 File and Dir Permissions.mp4
    08:30
  • 004 Examples with File Permissions.mp4
    04:30
  • 005 After this video youll understand all LINUX Permissions.mp4
    19:46
  • 006 Chmod.mp4
    12:45
  • 001 Fundamentals of Processes in System.mp4
    06:55
  • 002 The Magic with PS Aux Command.mp4
    07:23
  • 003 The Magic with TOP Command.mp4
    08:12
  • 004 Foreground and Background Processes.mp4
    07:57
  • 005 From Background to Foreground.mp4
    04:20
  • 006 The Tutorial with Linux Process Signals.mp4
    11:33
  • 001 Introduction to Packet Management Systems.mp4
    04:43
  • 002 Why we need package management tools.mp4
    06:14
  • 003 Package Management in Linux - Final.mp4
    08:40
  • 001 Trcrt command.mp4
    08:25
  • 002 Networking with Linux.mp4
    07:12
  • 001 Collecting Storage Media using FKT.mp4
    15:05
  • 002 Using Linux for Non-Volatile Memory Acquisltion.mp4
    20:48
  • 003 Linux Image File splitting.mp4
    07:37
  • 004 Verifying Hash Values.mp4
    01:47
  • 005 GYMGR.mp4
    09:22
  • 001 A1-Image-Analysis-using-FRMT-Part-1.txt
  • 001 Image Analysis using FRMT - Part 1.mp4
    16:15
  • 002 Storage Analysis with SLCPL.mp4
    09:36
  • 003 Storage Analysis with BLK EXT.mp4
    12:05
  • 001 The TCPIP Couse Part 1.mp4
    23:42
  • 002 The TCPIP Couse Part 2.mp4
    17:28
  • 001 Fundamentals of Mobile Forensics.mp4
    16:18
  • 002 Android Forensics and IOS Forensics.mp4
    05:15
  • 003 Android Root.mp4
    04:14
  • 001 Introduction to Volatility Framework.mp4
    05:59
  • 002 A2.txt
  • 002 Downloading and Installing Volatility.mp4
    03:42
  • 003 Downloading and Unrar Sample Images for Volatility.mp4
    13:43
  • 004 Volatility Plugins - Part 1.mp4
    05:24
  • 005 A5.txt
  • 005 Volatility Plugins Part 2 - Network Analysis.mp4
    06:54
  • 006 A6.txt
  • 006 Network Analysis.mp4
    05:15
  • 007 A7.txt
  • 007 DLL Analysis.mp4
    11:02
  • 008 A8.txt
  • 008 Volatility Registry Analysis.mp4
    07:50
  • 009 A9.txt
  • 009 Password Extraction and Timeliner Plugin.mp4
    04:54
  • 010 A10.txt
  • 010 Volatility Plugins Part 3.mp4
    14:40
  • 011 A11.txt
  • 011 Analysis of the Malware Using Volatility.mp4
    05:16
  • 012 DLL and Memory Dump using Volatility.mp4
    11:48
  • 013 EXE Dump and Last lecture of section.mp4
    05:46
  • 014 DONE.mp4
    00:10
  • Description


    Learn digital forensics and be computer forensics investigator / Certificate after completing course / DFMC+ / DFIR 2023

    What You'll Learn?


    • Understanding the role of digital forensics in criminal investigations.
    • Investigating online fraud and identity theft.
    • Cyber Security for Digital Forensics Investigators
    • Malware Analysis
    • Investigate Volatile and Non-Volatile Memory
    • Investigating the use of encryption and data hiding techniques.
    • Data Acquisition
    • Evidence Analysis
    • Open Source Intelligence
    • Fundamentals of Computer Forensics
    • Debugging and Analysis Malware
    • Mobile Forensics
    • Web Browser Forensics
    • Linux for Digital Forensics and File Analysis
    • Digital Forensics Fundamentals
    • Understanding the fundamentals of digital forensics.
    • Creating Digital Forensics Lab
    • Learning the legal and ethical implications of digital evidence.
    • TCP/IP
    • Identifying the types of digital evidence that can be collected.
    • Networking
    • Digital forensics LAW
    • Computer Forensics for Beginners
    • Knowing the basic concepts of file systems and storage devices.
    • Analyzing digital evidence using tools such as EnCase and FTK.
    • Identifying evidence of cybercrime, cyberterrorism and other cyber threats.
    • Learning about the chain of custody and preserving evidence.
    • Investigating network security breaches and incidents.
    • Collecting, analyzing and reporting digital evidence.
    • Understanding the basic principles of computer forensics.
    • Conducting effective digital forensic investigations.
    • Understanding cyberstalking and other cybercrimes.
    • Detecting and analyzing malware and viruses.
    • Analyzing mobile devices for digital evidence.
    • Learning about forensic lab equipment and technology.
    • Investigating the use of social media and digital communication.
    • Examining email and instant messaging for evidence.
    • Collecting and analyzing data from cloud storage.
    • Analyzing web browsing and internet history.
    • Investigating cyberbullying and online harassment.
    • Understanding the role of digital forensics in civil litigation.
    • Examining the security of computer networks.
    • Analyzing forensic evidence in civil and criminal cases.
    • Collecting evidence from digital devices such as cameras and DVRs.
    • Understanding the basics of cryptography and encryption.
    • Conducting forensic investigations in a corporate environment.
    • Understanding the impact of technology on the legal system.
    • and other awesome topics ->

    Who is this for?


  • Beginner Digital Forensics Investigators
  • Computer Forensics
  • Computer Forensics Investigator
  • What You Need to Know?


  • No requirements or experience needed
  • More details


    Description

    Become a Digital Forensics Investigator and learn one of most requested skills of 2023!

    This is the most comprehensive, yet straight-forward, course for the Digital Forensics on Udemy!

    *Get the Official Certificate after Completing the Course


    Welcome to the Digital Forensics Masterclass, the ultimate guide to the world of digital forensics and forensic science. In this comprehensive course, we will cover everything you need to know to become a proficient digital forensic investigator, from the basics of computer systems and networks to advanced techniques for analyzing digital evidence.

    This course is designed to provide you with a complete understanding of the forensic process, with a focus on digital devices and data. You will learn how to identify and extract data from digital devices, including computers, smartphones, and other electronic devices. You will also learn how to analyze and interpret this data using forensic tools and techniques, and how to present your findings in a clear and concise manner.

    The course covers a wide range of topics, including the basics of computer systems and networks, forensic data acquisition and analysis, file systems and data recovery, network forensics, and mobile device forensics. You will also learn about the legal and ethical considerations of digital forensics, as well as the best practices for conducting investigations and preserving evidence.

    The course is designed for anyone interested in the field of digital forensics, including IT professionals, law enforcement personnel, and cybersecurity experts. No prior knowledge of digital forensics or forensic science is required, although a basic understanding of computer systems and networks is recommended.

    By the end of this course, you will have a deep understanding of digital forensics and forensic science, and the skills and knowledge needed to conduct a digital forensic investigation from start to finish. You will also receive a Digital Forensics Masterclass Certificate of Completion, which you can add to your resume or LinkedIn profile to showcase your skills and knowledge.

    Enroll now and take the first step towards becoming a digital forensic investigator with the Digital Forensics Masterclass | Forensic Science 2023 DFMC+â„¢.

    Digital forensics is a branch of forensic science encompassing the recovery, investigation, examination and analysis of material found in digital devices, often in relation to mobile devices and computer crime. The term digital forensics was originally used as a synonym for computer forensics but has expanded to cover investigation of all devices capable of storing digital data. With roots in the personal computing revolution of the late 1970s and early 1980s, the discipline evolved in a haphazard manner during the 1990s, and it was not until the early 21st century that national policies emerged.

    Digital forensics investigations have a variety of applications. The most common is to support or refute a hypothesis before criminal or civil courts. Criminal cases involve the alleged breaking of laws that are defined by legislation and that are enforced by the police and prosecuted by the state, such as theft and assault against the person. Civil cases on the other hand deal with protecting the rights and property of individuals (often associated with family disputes) but may also be concerned with contractual disputes between commercial entities where a form of digital forensics referred to as electronic discovery (discovery) may be involved

    During the 1980s very few specialized digital forensic tools existed, and consequently investigators often performed live analysis on media, examining computers from within the operating system using existing sysadmin tools to extract evidence. This practice carried the risk of modifying data on the disk, either inadvertently or otherwise, which led to claims of evidence tampering. A number of tools were created during the early 1990s to address the problem.

    Digital forensics is commonly used in both criminal law and private investigation. Traditionally it has been associated with criminal law, where evidence is collected to support or oppose a hypothesis before the courts. As with other areas of forensics this is often a part of a wider investigation spanning a number of disciplines. In some cases, the collected evidence is used as a form of intelligence gathering, used for other purposes than court proceedings (for example to locate, identify or halt other crimes). As a result, intelligence gathering is sometimes held to a less strict forensic standard.

    If you enroll in our Digital Forensics Masterclass | Forensic Science 2023 DFMC, you'll not only learn about the fundamentals of digital forensics, but so much more! Our course covers a broad range of topics such as analyzing digital evidence from social media and mobile devices, investigating cyber crimes and terrorism, and learning the legal and ethical implications of digital evidence. You'll gain knowledge on topics like network security breaches, cyberbullying, and even the impact of technology on the legal system. So don't wait, enroll today and discover the vast world of digital forensics.

    Who this course is for:

    • Beginner Digital Forensics Investigators
    • Computer Forensics
    • Computer Forensics Investigator

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    OCSALY Academy | 160.000+ Students
    OCSALY Academy | 160.000+ Students
    Instructor's Courses
    The OCSALY’s goal in the next three years, is to teach 2 million people new skills.Also OCSALY’s own courses, which are all available here, we are working with the very best instructors, creating courses to teach the essential skills required by developers, at all levels.One other important philosophy is that our courses are taught by real professionals; software developers, digital forensics investigators with real and substantial experience in the industry, who are also great teachers.  All our instructors are experienced, software developers!Our team is ONLINE creating new courses and answering your questions right now.Whether you are a beginner, looking to learn how to program for the very first time, or to brush up on your existing skills, or to learn new languages, frameworks or skills, the Academy has you covered all resources to learn from professional instructors !
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 118
    • duration 13:30:31
    • English subtitles has
    • Release Date 2023/12/16