With this course, a professional can feel confident about his knowledge and ability to analyze any security flaw rising up in the system. This course can help prevailing as well as new professionals to develop an existing and a new career respectively. Computer Hacker and Forensic Investigator is one of the most valued certificates in Network Security and possessing it raises one to an elite group of professionals.
These professionals will be able to find forensic evidences in a neutral perspective. They will also be in a position to determine the vulnerabilities and track the intruders into the systems.
By attaining this Course , professionals can prove their skill and knowledge in the following fields.
This class covers the Introduction to Computer Forensics. This video reviews the various definitions of what computer forensics is.
This class covers the Introduction to Computer Forensics. This video reviews the aspects of Oranizational security such as Physical Security, IT Security, Financial Security, and Legal Security. Along with covering th Objective & Need of Computer Forensics, and the Benefits of Forensics Readiness.
This class covers the Introduction to Computer Forensics. This video reviews the Goals of Forensics Readiness and what Cyber Crime is. Along with covering Modes of Attacks such as Insider Attack, and External Attack, and reviewing examples of Cyber Crime and the organizational chart of Cyber Crime.
This class covers the Introduction to Computer Forensics. This video reviews the Cyber Crime Investigation, and the Key Steps in a Forensics Investigation.
This class covers the Introduction to Computer Forensics. This video reviews the Role of a Forensics Investigator. Along with understanding a Corporate Investigation, and how the Enterprise Theory of Investigation (ETI) relates to it. This video also discusses reporting results, and the importance of reporting cyber crimes.
This class covers the Computer Forensics Investigation Process. This video reviews the steps of Investigating Computer Crime, what to do before the investigation, how to build a workstation, how to build a team and who should be apart of it. We will also review Policies and law, such as Forensics Law. Next we will review warrants, forensics photography, collecting evidence, and guidelines for securing and managing evidence.
This class covers the Computer Forensics Investigation Process. This video reviews Data Analysis, and tools to analyis data. Along with covering Evidence and Case assessment, and the best practices for that. Next we will cover dosumentation in each phase, the importance of gathering and organizing information, how to write the investigation report, who a expert witness is, how to testify in court, and closing the case. We will wrap up with Computer Forensics Service Providers.
This lab covers the Computer Forensics Investigation Process. This video reviews how to calculate the hash value of evidence.
This lab covers the Computer Forensics Investigation Process. This video reviews how to calculate the hash, and to check the file process.
This class covers Searching and Seizing Computers. This video reviews searching and seizing computers without a warrant, and laws and examples that protect individual rights.
This class covers Searching and Seizing Computers. This video reviews expectation to the warrant requirement in cases involving computers. Along with covering what is consent and the types such as, third party consent and implied consent. We will also cover exigent circumstances, what plain view is, and search incident to a lawful arrest.
This class covers Searching and Seizing Computers. This video reviews searches such as, inventory searches, border searches, workplace searches, and searching and seizing a computer with a warrant. Along with how to have a successful search with a warrant.
This class covers Searching and Seizing Computers. This video reviews the strategies for executing computer searches, what to do when hardware is itself contraband or a storage device for evidence of a crime. We will also review the Privacy Protection Act, the terms and applications that go with it, and the civil liability under the Electronic Communications Privacy Act.
This class covers Searching and Seizing Computers. This video reviews the need for multiple warrants, and types of warrants such as No-Knock warrants and Sneak-and-Peek warrants. Along with covering how to approach privileged documents, and how to draft a warrant and affidavit, and how to defend your warrants against challenges.
This class covers Digital Evidence. This video covers what Digital Evidence is, the challenges that face it, the role of it, along with the characteristics, and fragility of it. We will also be reviewing Anti-Digital Forensics, types of digital data, and the rules of evidence.
This class covers Digital Evidence. This video reviews the Federal Rules of Evidence, International Organization on Computer Evidence, and Scientific Working Group on Digital Evidence. Along with covering different types of electronic devices for collecting potential evidence.
This class covers Digital Evidence. This video reviews evidence preservation, evidence examination and analysis, and evidence documenting.
This class covers Digital Evidence. This video reviews evidence examiner reports, and final report of findings.
This class covers First Responder Person. This video reviews what electronic evidence is and the role of the first responder. Along with reviewing different electronic devices used to collect evidence from, and the tool kit that the First Responder needs.
This class covers First Responder Person. This video reviews evidence collecting tools and equipment, and the First Responder Rule. Along with reviewing different situations for responses such as, incident response, first response for system administrator, first response by non-laboratory staff, and first response by laboratory staff.
This class covers First Responder Person. This video reviews securing and evaluating electronic crime scene by knowing what questions to ask, what concent is, obtaining witness signatures, knowing how to conduct preliminary interviews, and documenting the crime scene with photos.
This class covers First Responder Person. This video reviews documenting the crime scene with sketches and videos, along with how to collect and preserve the evidence. We will also address how to deal with powered on/off electronic devices, networked electronic devices, and open files/start up files on electronic devices.
This class covers First Responder Person. This video reviews computers and servers and how to collect and preserve evidence from them. We will also address how to package electronic evidence and the importance of, exhibit numbers, transporting evidence safely, and what a chain of custody form is and how to fill it out. We will also remind you to have a note taking checklist and review common mistakes made by First Responders.
This class covers Computer Forensic Lab. This video reviews what a computer forensic lab is, how to plan for it, budget for it, the physical needs of it, and cetain environmental conditions required for it. Along with electronic needs, communication needs, work area needs, and ambiece needed for a Forensics lab.
This class covers Computer Forensic Lab. This video reviews a computer forensic investigator, law enforcement officer, and lab director. We also review Forencsic lab licensing requisite, features needed for imaging systems, auditing a lab, services provided by the lab, and equipment required such as workstations and software.
This lab covers how to use Data Lifter to gather evidence. Part 2
This lab covers how to use Data Lifter to gather evidence. Part 3
This lab covers how to use Data Lifter to gather evidence. Part 3
This lab covers how use P2 Commander to handle evidence. Part 2
This lab covers how use P2 Commander to handle evidence. Part 3
This class covers Understanding Hard Disk & File Systems. This video reviews disk drives, what a Hard Disk Drive is, what a Solid State Drive is, and what the physical structure of a Hard Disk is.
This class covers Understanding HardDisk & File Systems. This video reviews types of Hard Disk interfaces, what a disk platter is, what a track is, how tracks numbering works, what a sector is, and how sector addressing works. Along with addressing what slack space, lost clusters, bad sectors, and master boot records are.
This class covers Understanding HardDisk & File Systems. This video reviews essential Windows systems files, the different files systems, what is popular Window files systems, and what File Allocation Table (FAT) is.
This class covers Understanding HardDisk & File Systems. This video reviews Linux files systems, including popular file systems. We will also cover Mac OS X file systems, and review what a RAID storge system is, and the different levels RAID has before wrapping up with reivew The Sleuth Kit (TSK).
This lab covers how to recover deleted files form Hard disk using Linux.
This lab covers how to use Procmod, the process monitor, to monitor processes running, operations, and hive details.
This class covers Data Acquisition & Duplication. This video reviews the difference between Static Acquisition and Live Acquisition, along with Data Acquisition formats, bit stream vs. Backups, why to create duplicates, problems that might come up with data duplication, and Data Acquisition methods.
This class covers Data Acquisition & Duplication. This video reviews Data Acquisition mistakes, rules of thumb, Static Acquisition and Live Acquisition, why volatile data is important and the mistakes that might come up, along with volatile data collection methods. We will also cover Disk Imaging tool requirements.
This class covers Data Acquisition & Duplication. This video reviews how to validate Data Acquisitions, what RAID disk are, and remote Data Acquisition. We also cover best practices for Acquisition such as, DD Command, dcfldd Command, extracting the MBR, Encase Forenisc, Image MASSTER: Solo-4 (Super Kit), mage MASSTER: RoadMASSter-3, and Tableau TDI Forensic Duplicator.
This lab covers how to take a image of the RAM memory using Helux. Part 1
This lab covers how to take an image of evidence using Kali. Part 1
This lab covers how to take a image of the RAM memory using Helux. Part 2
This class covers Recovering Deleted Files & Partitions. This video reviews what deleted files are, what happens deleted files when you delete them from Windows. We also review what to do with damaged or deleted INFO files, and damaged recycle folder. Then we cover file recovery in Mac OS X and Linux, and some tools that you can use to recover files.
This lab covers how to use Stellar Phoenix Windows Data Recovery for data recovery.
This lab covers how to partition recovery using MiniTool Power Data Recovery
This class covers Stegnography. This video reviews what steganography is, the legal use, unethical use, techniques, and classification. Along with reviewing the different types of Steganography, we will look more into Technical Steganography, Linguistic Steganography, and Image Steganography.
This class covers Stegnography. This video reviews Steganography tools such as S-Tools. We will also review Audio Steganography, methods for Audio Steganography, tools for Audio Steganography such as Mp3stegz. Video Steganography is also reviewed, along with another Steganography tool, MSU. We look at Document Steganography tool, wbStego, Invisible Secrets, and explain the Steganography file system. We end the video explaining Image Files, common terminologies, review vector images, and review raster images.
This class covers Stegnography. This video reviews Data Compression, how it works, what lossless compression is, what lossy compression is. Along with reviewing best practices for forensic image, locating and recovering image files, how Hex Workshop works, and some other tools you can use.
This lab covers recover photo evidence from a raw file using Adroit Photo Forensics. Part 1
This lab covers how to recover photo evidence from a raw file using Adroit Photo Forensics. Part 2
This lab covers how to analysis image file headers using Hex Workshop.
This lab covers how to perform image analyzer with Stegdetect.
This lab covers how to do steganography using Quickstego.
Join the Cyber Security Industry in 2017!
Interested in starting a career in the Cyber Security Industry? 2017 is the time!
Learning the fundamentals of Cyber Security provides you with a powerful, and very useful, set of skills. Learn to think like a hacker so you can better defend your networks and data by studying Penetration Testing and Ethical Hacking.
Jobs in Cyber Security are plentiful. Receiving your Certified Ethical Hacker, Certified Hacker Forensic Investigator, Penetration Tester and Security+ certification will give you a strong background to more easily tackle and pick up more advanced exams, such as the CISSP certification.
Get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over one million Cyber Security job openings globally. Demand is greatly outpacing supply which means more opportunity, job security and higher pay for you!
But, don't take our word for it... take a look at the FREE previews (they are available in all our courses) and see for yourself!
CyberTraining 365 is an online academy that offers most in-demand cybersecurity training and certification through different subscription models. Members have access to the ever growing library of quality, engaging videos that are taught by some of industry’s best and most recognized experts.
CyberTraining365 is powered by Social27's patented cloud-based eLearning platform, providing members with an engaging and collaborative learning environment. Through best in class content, social learning tools, and gamification, CyberTraining365 is taking eLearning from Isolation to Collaboration.