Cademy logoCademy Marketplace

Course Images

Digital Forensics Hands-on Online Training for Pentesters

Digital Forensics Hands-on Online Training for Pentesters

  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • On-Demand course

  • All levels

Description

Digital Forensics Hands-on Online Training for Pentesters Course Overview

Are you looking to begin your digital forensic investigation career or want to develop more advanced skills in digital forensic investigation? Then this digital forensics hands-on online training for pentesters course will set you up with a solid foundation to become a confident pentester and help you to develop your expertise in digital forensic investigation.

This digital forensics hands-on online training for pentesters course is accredited by the CPD UK & IPHM. CPD is globally recognised by employersprofessional organisations and academic intuitions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD certified certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world.

Whether you are self-taught and you want to fill in the gaps for better efficiency and productivity, this digital forensics hands-on online training for pentesters course will set you up with a solid foundation to become a confident pentester and develop more advanced skills. Gain the essential skills and knowledge you need to propel your career forward as a pentester.

The digital forensics hands-on online training for pentesters course will set you up with the appropriate skills and experience needed for the job and is ideal for both beginners and those currently working as a pentester.

This comprehensive digital forensics hands-on online training for pentesters course is the perfect way to kickstart your career in the field of digital forensic investigation. This digital forensics hands-on online training for pentesters course will give you a competitive advantage in your career, making you stand out from all other applicants and employees.

If you're interested in working as a pentester or want to learn more skills on digital forensic investigation but unsure of where to start, then this digital forensics hands-on online training for pentesters course will set you up with a solid foundation to become a confident pentester and develop more advanced skills.

As one of the leading course providers and most renowned e-learning specialists online, we're dedicated to giving you the best educational experience possible. This digital forensics hands-on online training for pentesters course is crafted by industry expert, to enable you to learn quickly and efficiently, and at your own pace and convenience.

Who is this Digital Forensics Hands-on Online Training for Pentesters course for?

This comprehensive digital forensics hands-on online training for pentesters course is suitable for anyone looking to improve their job prospects or aspiring to accelerate their career in this sector and want to gain in-depth knowledge of digital forensic investigation.

Entry Requirement

  • There are no academic entry requirements for this digital forensics hands-on online training for pentesters course, and it is open to students of all academic backgrounds.
  • As long as you are aged seventeen or over and have a basic grasp of English, numeracy and ICT, you will be eligible to enrol.

Assessment Method

This digital forensics hands-on online training for pentesters course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner can grasp from each section. In the assessment pass mark is 60%.

Course Curriculum

Course Overview

Course Overview

Building Your Forensics Lab Environment Using VirtualBox

Video - Downloading ISO and OVA Files for VirtualBox

Video and Lab - Create a Virtual Install of CSI Linux 2021.2

Video and Lab - Create a Kali Live (Forensic Mode) VM Using VirtualBox

Video and lab - Create a Virtual Install Kali Image Using VirtualBox

Video and Lab - Create Virtual Install of Windows 10 Using VirtualBox

Video and Lab - Create a Virtual Install of Metasploitable2 Using VirtualBox

Using Kali Forensic Mode and Autopsy

Video and Lab -Getting Started with Autopsy

Video and Lab - Simulate Creating a Disk Image for a Forensic Analysis

Video and Lab - Examining a forensic Disk Image Using Autopsy

Video and Lab - Installing the WebMap-Nmap Dashboard

Open-source intelligence (OSINT)

Video and Lab - Conducting OSINT Using CSI Linux Investigator

Video and Lab - Find Social Media Accounts Using Sherlock

Video - OSINT Framework - Overview

Using Shodan to Search for Vulnerable devices

Video and Lab - Preparing CSI Investigator to Use Shodan

Video and Lab - Using Shodan to Find Vulnerable Devices

Video and lab - Using Shodan to Search for Vulnerable Databases

Computer Forensics

Video - Attaching an External USB Device in Kali

Video and Lab - Acquiring a Forensic Copy of the Windows Registry

Video and Lab - Analyzing the Windows Registry for Evidence

Video and Lab - Dumping Wi-Fi Credentials Using netsh

Video and Lab - Email Header Analysis

Video and Lab - Using Shellbags to View Hidden or Deleted Folders

Video and Lab - Extracting Thumbnail Images From a Suspects Machine

Video and lab - Memory Forensics Using the Volatility Framework

Reverse Engineering and Malware Analysis

Video and Lab - Install Ghidra on CSI Linux

Video and Lab - Introduction to Using Ghidra

Video and Lab - Reverse Engineering crackme0x00 Using Ghidra

Video and Lab - Reverse Engineering crackme0x05 Using Ghidra

Video and Lab - Analyzing the WannaCry KillSwitch Using Ghidra

Malware Hunting with Sysinternal Tools

Video - Overview of Sysinternal Tools

Video - Overview of Sysinternal's Process Explorer

Video and Lab - Finding Malware with Sysinternals Process Explorer

Stenography

Video and Lab - Using Steghide for Hiding and Extracting Data

Video and Lab - Using the EXIFtool to Read and Write EXIF Tags

Network forensics Using Wireshark

Video - Overview of Wireshark 3.2

Video - Wireshark Capture Options

Video - Wireshark Toolbar Icons

Video and Lab - Installing a Wireless Adapter in Kali

Video and Lab - Hacking a Wireless Network Using Kali Linux

Video - Capturing Wireless Traffic Using Wireshark

Practice What You learned

Video and Lab - CTF Lab Build for HA: Forensics

Video and lab - Capture flag #1

Video and lab - Capture flag #2

Video and lab - Capture flag #3

Video and lab - Capture flag #4

About The Provider

Lead Academy
Lead Academy
Swindon

Lead Academy is a leading provider of online training, practical courses, and professional accreditation. Our innovative e-learning platform offers professional...

Read more about Lead Academy

Tags

Reviews