Booking options
£18
£18
On-Demand course
5 hours 39 minutes
All levels
Won't it be great if you could recover your lost data from your device or ensure that the hackers cannot reach you? What about tracking the hacker and get back the data they have stolen from you? Digital security has become one of the greatest concerns today. Learn how you can secure your device and find out black hat hacker criminals from this Digital Forensics for Pentesting Course and ensure data security.
In this Digital Forensics for Pentesting Course, you will learn the importance of digital forensic investigation, the basics of cybersecurity, pentesting and digital forensic. You'll understand the functions of Malware and how to track them back.
This course is ideal for understanding how digital devices can be hacked and how to prevent them. You will be able to understand digital forensic investigation steps with easily understandable and bite-sized lessons.
This course will be helpful for anyone who wants to learn about pentesting and interested in digital forensic investigation. You will learn how to understand digital forensic investigation step by step from this course.
Digital Forensics for Pentesting Course is a useful qualification to possess and would be beneficial for any related profession or industry such as:
Course Overview | |||
Course Overview | 00:06:00 | ||
Building Your Forensics Lab Environment Using VirtualBox | |||
Lab - Installing CSI Linux | 00:13:00 | ||
Lab - Creating a Kali Live (Forensic Mode) VM Using VirtualBox | 00:06:00 | ||
Lab - Create a Virtual Install Kali Image Using VirtualBox | 00:07:00 | ||
Lab - Create Virtual Install of Windows 10 Using VirtualBox | 00:08:00 | ||
Install Additional Tool Using Katoolin3 | 00:10:00 | ||
Using Kali Forensic Mode and Autopsy | |||
Lab - Simulate Creating a Disk Image for a Forensic Analysis | 00:11:00 | ||
Lab - Examining a forensic Disk Image Using Autopsy | 00:12:00 | ||
Digital Forensics Case Management | |||
Lab -Digital Forensics Using Autopsy Part I | 00:11:00 | ||
Lab - Digital Forensics Using Autopsy Part II | 00:07:00 | ||
Lab - Installing the WebMap-Nmap Dashboard | 00:12:00 | ||
Open-source intelligence (OSINT) | |||
Lab - Conducting OSINT Using CSI Linux Investigator | 00:08:00 | ||
Lab - Find Social Media Accounts Using Sherlock | 00:07:00 | ||
Computer Forensics | |||
Attaching an External USB Device in Kali | 00:07:00 | ||
Lab - Memory Forensics Using the Volatility Framework | 00:18:00 | ||
Lab - Acquiring a Forensic Copy of the Windows Registry | 00:15:00 | ||
Lab - Analyzing the Windows Registry for Evidence | 00:14:00 | ||
Using Shodan to Search for Vulnerable devices | |||
Lab - Preparing CSI Investigator to Use Shodan | 00:05:00 | ||
Lab - Using Shodan to Find Vulnerable Devices | 00:16:00 | ||
Lab - Using Shodan to Search for Vulnerable Databases | 00:08:00 | ||
Stenography | |||
Lab - Using the EXIFtool to Read and Write EXIF Tags | 00:11:00 | ||
Using the EXIFtool to Read and Write EXIF Tags | 00:10:00 | ||
Network forensics Using Wireshark | |||
Overview of Wireshark 3.2 | 00:11:00 | ||
Wireshark Capture Options | 00:07:00 | ||
Wireshark Toolbar Icons | 00:04:00 | ||
Lab - Capturing a 3-way TCP Handshake Using Wireshark | 00:05:00 | ||
Lab - Installing a Wireless Adapter in Kali | 00:09:00 | ||
Lab - Hacking a Wireless Network Using Kali Linux | 00:14:00 | ||
Capturing Wireless Traffic Using Wireshark | 00:05:00 | ||
Practice What You Have learned | |||
Lab - CTF Lab Build for HA: Forensics | 00:11:00 | ||
Lab - Capture flag #1 | 00:12:00 | ||
Lab - Capture flag #2 | 00:10:00 | ||
Lab - Capture flag #3 | 00:20:00 | ||
Lab - Capture flag #4 | 00:09:00 | ||
Certificate and Transcript | |||
Order Your Certificates and Transcripts | 00:00:00 |