Digital Forensics for Cyber Professionals
3.3 (17 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
221 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Digital Forensics for Cyber Professionals to your Wishlist.

Add to Wishlist

Digital Forensics for Cyber Professionals

Hands-On Digital Forensics for Real World Application
3.3 (17 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
221 students enrolled
Created by Chad Russell
Last updated 11/2016
English
English [Auto-generated]
Current price: $10 Original price: $55 Discount: 82% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 2 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • In this course you will learn how to use open source tools to collect digital forensic information from Linux and Windows systems. This course focuses on screencast demonstrations of how to use these tools in a step-by-step manner so you can start doing forensics work immediately on your own.
View Curriculum
Requirements
  • Students should have a working knowledge of computers including some basic familiarity with Linux and Windows.
Description

In this course you will learn how to use open source tools to collect digital forensic information from Linux and Windows systems.   You will learn how to conduct static malware analysis of live 'Ransomware' using forensics tools and techniques.

This course focuses on screencast demonstrations of how to use these tools in a step-by-step manner so you can start doing forensics work immediately on your own.   

  • Digital Forensics Overview
  • Recovery and Reconstruction
  • Reversing and Malware Analysis
  • Windows and Linux Live Response
  • Incident Response Techniques
  • Red and Blue Team Tools 
  • Conduct Forensic Analysis of Hacker Activities
  • CAINE
  • Forensics Tools and Storage

Learn to use open source tools such as CAINE to do forensic analysis on live systems.   

Learn about basic and advanced techniques you will need to gain a grasp on GIAC and other Computer Forensic certifications.  The Cyber Forensics field is red hot.   Stake your claim now!

Who is the target audience?
  • This course is for computer and networking beginners and professionals who want to learn how to conduct hands on digital forensics.
Compare to Other Digital Forensics Courses
Curriculum For This Course
12 Lectures
01:51:40
+
The Digital Forensics Field
2 Lectures 17:37

You will learn about the layout of the course and the course objectives which include:

  • Digital Forensics Overview
  • Recovery and Reconstruction
  • Reversing and Malware Analysis
  • Forensics Tools and Storage
Preview 03:37

Computer forensics is a branch of digital forensic science pertaining to evidence found in computers and digital storage media.   In this introductory lesson you will learn about how to conduct forensics investigations and digital forensics technologies and techniques. 

Preview 14:00
+
Recovery and Reconstruction
3 Lectures 42:57

In this lesson you will learn how to recover deleted file content from a forensic duplicate of a Windows system using a Linux based forensic workstation.

Forensically Recovering Deleted Files
17:42

Learn how to reconstruct the Windows Registry from a forensic duplicate. You will also learn how to gather local workstation e-mail information to reconstruct e-mail communications.

E-Mail Forensics and Windows Registry Reconstruction
09:09

In this lesson you will learn how to identify files of unknown origin and deconstruct them for forensic analysis using 'static' and 'dynamic' analysis techniques.

Analyzing Linux Files of Unknown Origin
16:06
+
Reversing and Malware Analysis
4 Lectures 33:38

Statically compile forensic response tools in Linux to be used to conduct a live response of another Linux system.

Linux Live Response
06:01

In this lesson you will learn how to build a Windows 'Live Response' CD that allows you to run live forensics on a target system without installing software on that target system.

Windows Live Response Tools
08:30

In this lesson you will analyze live Ransomware using static malware analysis techniques. 

Sandboxing and Malware Analysis
05:12

Learn how to conduct static malware analysis of live 'Ransomware' using forensics tools and techniques.   

Ransomware Analysis - Hands-On
13:55
+
Forensics Tools and Storage
2 Lectures 16:26

In this lesson you will learn how to utilize the CAINE (Computer Aided Investigation Environment) Linux distribution. CAINE is pre-loaded with a complete forensic environment that is compiled to integrate open-source software tools as software modules and contains a user friendly graphical interface.

Preview 05:57

In this lesson you will learn how to forensically duplicate, mount and analyze USB devices.

USB Forensic Analysis
10:29
+
Course Summary
1 Lecture 01:02

Review what you have learned and how you can apply these skills in real world forensic scenarios. 

Course Summary
01:02
About the Instructor
Chad Russell
3.8 Average rating
1,125 Reviews
23,022 Students
24 Courses
Join the Cyber Security Industry in 2016!

Instructor Bio – Chad Russell

Join the Cyber Security Industry in 2017!

If you are interested in starting a career in the Cyber Security Industry 2016 is the time! 

Learning the fundamentals of Cyber Security provides you with  a powerful and very useful set of skills.  Study Penetration Testing and Ethical Hacking and learn to think like a hacker so you can better defend your networks and data.   

Jobs in Cyber Security are plentiful, and getting Security+ Certified will give you a strong background to more easily pick up and tackle more advanced exams such as the Certified Ethical Hacker and CISSP certifications.  

Get certified and land an entry level Cyber Security position paying upwards of six figures!  There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you!   

But, don't take my word for it...please take a look at the FREE previews (they are available in all my courses) and see for yourself.  This year I have partnered with webofsecurity.com, a premier provider of ‘All Things Information Security’ to bring you a fantastic suite of Cyber Security certification training to help you get into the hottest industry in IT. 

About me:

Hello, I’m Chad Russell.  I’ve been in the CyberSecurity industry for over 15 years.  I’ve taught Microsoft Engineering courses as a Certified trainer, I’ve managed teams of security engineers and analysts for an internet banking provider, I’ve been an information security consultant working for companies including SAP, Microsoft and Oracle.   

I lead and conduct 'Security Risk Assessments' for customers throughout North America with an emphasis on cloud security, identity governance, network security, social engineering, mobile security, breach assessments, database security and access management.  

Over the past 15 years I've held numerous certifications including CISSP, CCNP, MCSE and MCDBA certifications and have a B.S. in Computer Science from Excelsior College  I can help you get certified and get ahead!