Buying for a Team? Gift This Course
Wishlisted Wishlist

Please confirm that you want to add Hacking & Digital Forensics & Autopsy - Stay Anonymous to your Wishlist.

Add to Wishlist

Hacking & Digital Forensics & Autopsy - Stay Anonymous

With Technology Advancement, staying anonymous and protecting your online and offline activities is critical,
4.1 (20 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
812 students enrolled
Created by Jon Webby
Last updated 6/2015
$10 $100 90% off
1 day left at this price!
30-Day Money-Back Guarantee
  • 1 hour on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Have a coupon?
What Will I Learn?
better understand of what is digital forensics
how is forensics perform
how to really stay annoymous
how is smartphone autopsy done
View Curriculum
  • a keen desire to learn more about cyber secret, hacking, forensics

The Course has been updated on January 2016

with technology advancement today. Are you staying on anonymous? Whether you have a secret or does not, I am sure you wouldn't want your movement or action to be known to some outsider

Staying anonymous is a art, if you know how the ISP trace and gather information on you, you can use that knowledge to better protect yourself, a few tools will be needed.

Another big Security issue

If your PC or Smartphone get stolen, what does it cost you? Sure a iphone cost you $1000 behind but what about the data inside, well you have backup that is great, but are you concern on your secret that the person that take hold of your iphone. if they just do a reset and sold it off for a profit, you are consider lucky

But if it fall into a hacker hand, he decided to do a forensic before selling off, all your sensitive information has no protection

Learn how to stay anonymous, learn how the digital forensic work, learn how to encrypt your data. Sure it might have a addition step when you use a device, but for a piece of mind, it might be worth many times if you just lost your device or your house get broken into with all the harddisk unencrypted, this is the worse. A forensic is not even needed if you have a unencrypted harddisk. And the windows logon is not a security at all, if you think that is, you better start thinking again.

Think again and Enroll in this course to protect your activities and stay Annoymous

Who is the target audience?
  • if you are looking for a hacking technique, this will not be the course for you
  • this course will show you various way of how forensics is done, and you can use that to better protect yourself
Students Who Viewed This Course Also Viewed
Curriculum For This Course
Expand All 8 Lectures Collapse All 8 Lectures 01:13:56
Introduction First
1 Lecture 01:35
Let Get Started
3 Lectures 27:09

Tor Hidden Services

Advanced Section
3 Lectures 31:51
Forensics Imaging

Forensic recovery

Forensics with Autopsy
Bonus Section
1 Lecture 13:21
Bonus - IPhone Forensics
About the Instructor
4.1 Average rating
20 Reviews
812 Students
1 Course
Professional Security Expert

A little introduction to myself. I have been working on computer for the whole of my life. The moment I have learn to use a computer I have dabble with it. As young as 8 years old when there is no Smartphone no Windows. Microsoft was still at a infant stage when all computer is running Dos 5.0.

I look thru all the command and execute all the game. Cracking all the copy protection (yes game at those time is copy protected by floppy disk) I amaze usually my parent and older adult. They are always wondering where did I learn all this. There wasn't internet yet not in those days, Some BBS is running. And from making friend with the hardware store. I learn how to disassemble a computer, tear all out and put it back in, I was even working free for a period of time just so I could learn about all the different kind of hardware.

Fast forward 30 years later. Technology changes, no longer is anybody using a floppy disk or even know what is a floppy disk. As technology advance so does the security compromise. In the 80s, your secret stay on your PC since there is no way a computer that is not link to anyway can get your secret out. In today, we are all connected to the Internet by PC, Laptop, Smartphone, Iphone, Tablets, even if you have anti virus or security suite install, can you believe you are staying anonymous?

Report Abuse