Level 4 Digital Forensics for Cyber Professionals explores the principles and techniques used to identify, collect, and analyse digital evidence. This course covers cyber investigations, data recovery, forensic tools, and legal considerations, helping learners understand how digital forensics supports cyber security and incident response activities.
| Course Overview | |||
| Course Overview | 00:06:00 | ||
| Building Your Forensics Lab Environment Using VirtualBox | |||
| Lab – Installing CSI Linux | 00:13:00 | ||
| Lab – Creating a Kali Live (Forensic Mode) VM Using VirtualBox | 00:06:00 | ||
| Lab – Create a Virtual Install Kali Image Using VirtualBox | 00:07:00 | ||
| Lab – Create Virtual Install of Windows 10 Using VirtualBox | 00:08:00 | ||
| Install Additional Tool Using Katoolin3 | 00:10:00 | ||
| Using Kali Forensic Mode and Autopsy | |||
| Lab – Simulate Creating a Disk Image for a Forensic Analysis | 00:11:00 | ||
| Lab – Examining a forensic Disk Image Using Autopsy | 00:12:00 | ||
| Digital Forensics Case Management | |||
| Lab -Digital Forensics Using Autopsy Part I | 00:11:00 | ||
| Lab – Digital Forensics Using Autopsy Part II | 00:07:00 | ||
| Lab – Installing the WebMap-Nmap Dashboard | 00:12:00 | ||
| Open-source intelligence (OSINT) | |||
| Lab – Conducting OSINT Using CSI Linux Investigator | 00:08:00 | ||
| Lab – Find Social Media Accounts Using Sherlock | 00:07:00 | ||
| Computer Forensics | |||
| Attaching an External USB Device in Kali | 00:07:00 | ||
| Lab – Memory Forensics Using the Volatility Framework | 00:18:00 | ||
| Lab – Acquiring a Forensic Copy of the Windows Registry | 00:15:00 | ||
| Lab – Analyzing the Windows Registry for Evidence | 00:14:00 | ||
| Using Shodan to Search for Vulnerable devices | |||
| Lab – Preparing CSI Investigator to Use Shodan | 00:05:00 | ||
| Lab – Using Shodan to Find Vulnerable Devices | 00:16:00 | ||
| Lab – Using Shodan to Search for Vulnerable Databases | 00:08:00 | ||
| Stenography | |||
| Lab – Using the EXIFtool to Read and Write EXIF Tags | 00:11:00 | ||
| Using the EXIFtool to Read and Write EXIF Tags | 00:10:00 | ||
| Network forensics Using Wireshark | |||
| Overview of Wireshark 3.2 | 00:11:00 | ||
| Wireshark Capture Options | 00:07:00 | ||
| Wireshark Toolbar Icons | 00:04:00 | ||
| Lab – Capturing a 3-way TCP Handshake Using Wireshark | 00:05:00 | ||
| Lab – Installing a Wireless Adapter in Kali | 00:09:00 | ||
| Lab – Hacking a Wireless Network Using Kali Linux | 00:14:00 | ||
| Capturing Wireless Traffic Using Wireshark | 00:05:00 | ||
| Practice What You Have learned | |||
| Lab – CTF Lab Build for HA: Forensics | 00:11:00 | ||
| Lab – Capture flag #1 | 00:12:00 | ||
| Lab – Capture flag #2 | 00:10:00 | ||
| Lab – Capture flag #3 | 00:20:00 | ||
| Lab – Capture flag #4 | 00:09:00 | ||
| Assignment | |||
| Assignment – Level-4 Digital Forensics for Cyber Professionals | 00:00:00 | ||