Computer Hacker and Forensic Investigator Training
- 9 hours on-demand video
- 20 downloadable resources
- Full lifetime access
- Access on mobile and TV
- Certificate of Completion
Get your team access to 4,000+ top Udemy courses anytime, anywhere.Try Udemy for Business
- Understand the process of investigating cyber-crimes and the laws involved, as well as details in obtaining a search warrant.
- Understand Different types of digital evidence, rules of evidence, digital evidence examination processes, and electronic crime and digital evidence consideration by crime category.
- How to recover deleted files and deleted partitions
- Understand The process involved in forensic investigation using Access Data FTK and Encase Steganography and its techniques, as well as steganalysis, and image file forensics
- Learn Password cracking concepts, tools, types of password attacks and how to investigate password protected file breaches.
- Learn different types of log capturing techniques, log management, time synchronization and log capturing tools.
- How to investigate logs, network traffic, wireless attacks, and web attacks
- How to track e-mails and investigate e-mail crimes and many more.
- An interest in investigating cyber crimes!
With this course, a professional can feel confident about his knowledge and ability to analyze any security flaw rising up in the system. This course can help prevailing as well as new professionals to develop an existing and a new career respectively. Computer Hacker and Forensic Investigator is one of the most valued certificates in Network Security and possessing it raises one to an elite group of professionals.
These professionals will be able to find forensic evidences in a neutral perspective. They will also be in a position to determine the vulnerabilities and track the intruders into the systems.
By attaining this Course , professionals can prove their skill and knowledge in the following fields.
- Investigation processes in Computer forensics
- Legal issues involved in investigations
- Searching evidence and digital handprints
- Methodologies of Acquisition and seizing
- Digital evidence, their types, examination processes
- Electronic crime and their categories
- Electronic crime scene evaluation, acquiring and conducting primary interviews
- Electronic evidence preservation and reporting crime scenes
- Setting up forensic lab in computer
- Knowledge of windows, linux and mac boot up
- File systems and their differences, booting a failed hard drive
- Volatile and non-volatile information gatherings
- Recover deleted files and hard dusk partitions
- Steganography, Steganalysis and forensics of image files
- Concepts of password cracking and investigating password attacks
- Investigate log files and determining the root cause
- Access Data FTK expertise
- Attacks on wireless and related issues
- E-mail crimes, its investigation and recovery of deleted mails
- Writing investigative reports
- All IT professionals involved with information system security, computer forensics, and incident response.
- Anyone interested in learning about investigating cyber crimes
This class covers the Introduction to Computer Forensics. This video reviews the various definitions of what computer forensics is.
This class covers the Introduction to Computer Forensics. This video reviews the aspects of Oranizational security such as Physical Security, IT Security, Financial Security, and Legal Security. Along with covering th Objective & Need of Computer Forensics, and the Benefits of Forensics Readiness.
This class covers the Introduction to Computer Forensics. This video reviews the Goals of Forensics Readiness and what Cyber Crime is. Along with covering Modes of Attacks such as Insider Attack, and External Attack, and reviewing examples of Cyber Crime and the organizational chart of Cyber Crime.
This class covers the Introduction to Computer Forensics. This video reviews the Role of a Forensics Investigator. Along with understanding a Corporate Investigation, and how the Enterprise Theory of Investigation (ETI) relates to it. This video also discusses reporting results, and the importance of reporting cyber crimes.
This class covers the Computer Forensics Investigation Process. This video reviews the steps of Investigating Computer Crime, what to do before the investigation, how to build a workstation, how to build a team and who should be apart of it. We will also review Policies and law, such as Forensics Law. Next we will review warrants, forensics photography, collecting evidence, and guidelines for securing and managing evidence.
This class covers the Computer Forensics Investigation Process. This video reviews Data Analysis, and tools to analyis data. Along with covering Evidence and Case assessment, and the best practices for that. Next we will cover dosumentation in each phase, the importance of gathering and organizing information, how to write the investigation report, who a expert witness is, how to testify in court, and closing the case. We will wrap up with Computer Forensics Service Providers.
This class covers Searching and Seizing Computers. This video reviews searching and seizing computers without a warrant, and laws and examples that protect individual rights.
This class covers Searching and Seizing Computers. This video reviews expectation to the warrant requirement in cases involving computers. Along with covering what is consent and the types such as, third party consent and implied consent. We will also cover exigent circumstances, what plain view is, and search incident to a lawful arrest.
This class covers Searching and Seizing Computers. This video reviews the strategies for executing computer searches, what to do when hardware is itself contraband or a storage device for evidence of a crime. We will also review the Privacy Protection Act, the terms and applications that go with it, and the civil liability under the Electronic Communications Privacy Act.
This class covers Searching and Seizing Computers. This video reviews the need for multiple warrants, and types of warrants such as No-Knock warrants and Sneak-and-Peek warrants. Along with covering how to approach privileged documents, and how to draft a warrant and affidavit, and how to defend your warrants against challenges.
This class covers Digital Evidence. This video covers what Digital Evidence is, the challenges that face it, the role of it, along with the characteristics, and fragility of it. We will also be reviewing Anti-Digital Forensics, types of digital data, and the rules of evidence.
This class covers Digital Evidence. This video reviews the Federal Rules of Evidence, International Organization on Computer Evidence, and Scientific Working Group on Digital Evidence. Along with covering different types of electronic devices for collecting potential evidence.
This class covers First Responder Person. This video reviews what electronic evidence is and the role of the first responder. Along with reviewing different electronic devices used to collect evidence from, and the tool kit that the First Responder needs.
This class covers First Responder Person. This video reviews evidence collecting tools and equipment, and the First Responder Rule. Along with reviewing different situations for responses such as, incident response, first response for system administrator, first response by non-laboratory staff, and first response by laboratory staff.
This class covers First Responder Person. This video reviews securing and evaluating electronic crime scene by knowing what questions to ask, what concent is, obtaining witness signatures, knowing how to conduct preliminary interviews, and documenting the crime scene with photos.
This class covers First Responder Person. This video reviews documenting the crime scene with sketches and videos, along with how to collect and preserve the evidence. We will also address how to deal with powered on/off electronic devices, networked electronic devices, and open files/start up files on electronic devices.
This class covers First Responder Person. This video reviews computers and servers and how to collect and preserve evidence from them. We will also address how to package electronic evidence and the importance of, exhibit numbers, transporting evidence safely, and what a chain of custody form is and how to fill it out. We will also remind you to have a note taking checklist and review common mistakes made by First Responders.
This class covers Computer Forensic Lab. This video reviews what a computer forensic lab is, how to plan for it, budget for it, the physical needs of it, and cetain environmental conditions required for it. Along with electronic needs, communication needs, work area needs, and ambiece needed for a Forensics lab.
This class covers Computer Forensic Lab. This video reviews a computer forensic investigator, law enforcement officer, and lab director. We also review Forencsic lab licensing requisite, features needed for imaging systems, auditing a lab, services provided by the lab, and equipment required such as workstations and software.
This class covers Understanding Hard Disk & File Systems. This video reviews disk drives, what a Hard Disk Drive is, what a Solid State Drive is, and what the physical structure of a Hard Disk is.
This class covers Understanding HardDisk & File Systems. This video reviews types of Hard Disk interfaces, what a disk platter is, what a track is, how tracks numbering works, what a sector is, and how sector addressing works. Along with addressing what slack space, lost clusters, bad sectors, and master boot records are.
This class covers Understanding HardDisk & File Systems. This video reviews Linux files systems, including popular file systems. We will also cover Mac OS X file systems, and review what a RAID storge system is, and the different levels RAID has before wrapping up with reivew The Sleuth Kit (TSK).
This class covers Data Acquisition & Duplication. This video reviews the difference between Static Acquisition and Live Acquisition, along with Data Acquisition formats, bit stream vs. Backups, why to create duplicates, problems that might come up with data duplication, and Data Acquisition methods.
This class covers Data Acquisition & Duplication. This video reviews Data Acquisition mistakes, rules of thumb, Static Acquisition and Live Acquisition, why volatile data is important and the mistakes that might come up, along with volatile data collection methods. We will also cover Disk Imaging tool requirements.
This class covers Data Acquisition & Duplication. This video reviews how to validate Data Acquisitions, what RAID disk are, and remote Data Acquisition. We also cover best practices for Acquisition such as, DD Command, dcfldd Command, extracting the MBR, Encase Forenisc, Image MASSTER: Solo-4 (Super Kit), mage MASSTER: RoadMASSter-3, and Tableau TDI Forensic Duplicator.
This class covers Recovering Deleted Files & Partitions. This video reviews what deleted files are, what happens deleted files when you delete them from Windows. We also review what to do with damaged or deleted INFO files, and damaged recycle folder. Then we cover file recovery in Mac OS X and Linux, and some tools that you can use to recover files.
This class covers Stegnography. This video reviews what steganography is, the legal use, unethical use, techniques, and classification. Along with reviewing the different types of Steganography, we will look more into Technical Steganography, Linguistic Steganography, and Image Steganography.
This class covers Stegnography. This video reviews Steganography tools such as S-Tools. We will also review Audio Steganography, methods for Audio Steganography, tools for Audio Steganography such as Mp3stegz. Video Steganography is also reviewed, along with another Steganography tool, MSU. We look at Document Steganography tool, wbStego, Invisible Secrets, and explain the Steganography file system. We end the video explaining Image Files, common terminologies, review vector images, and review raster images.
This class covers Stegnography. This video reviews Data Compression, how it works, what lossless compression is, what lossy compression is. Along with reviewing best practices for forensic image, locating and recovering image files, how Hex Workshop works, and some other tools you can use.