Hacking & Digital Forensics & Autopsy - Stay Anonymous

With Technology Advancement, staying anonymous and protecting your online and offline activities is critical,
4.2 (18 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
799 students enrolled
$19
$100
81% off
Take This Course
  • Lectures 8
  • Length 1 hour
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 5/2015 English

Course Description

The Course has been updated on January 2016

with technology advancement today. Are you staying on anonymous? Whether you have a secret or does not, I am sure you wouldn't want your movement or action to be known to some outsider

Staying anonymous is a art, if you know how the ISP trace and gather information on you, you can use that knowledge to better protect yourself, a few tools will be needed.

Another big Security issue

If your PC or Smartphone get stolen, what does it cost you? Sure a iphone cost you $1000 behind but what about the data inside, well you have backup that is great, but are you concern on your secret that the person that take hold of your iphone. if they just do a reset and sold it off for a profit, you are consider lucky

But if it fall into a hacker hand, he decided to do a forensic before selling off, all your sensitive information has no protection

Learn how to stay anonymous, learn how the digital forensic work, learn how to encrypt your data. Sure it might have a addition step when you use a device, but for a piece of mind, it might be worth many times if you just lost your device or your house get broken into with all the harddisk unencrypted, this is the worse. A forensic is not even needed if you have a unencrypted harddisk. And the windows logon is not a security at all, if you think that is, you better start thinking again.

Think again and Enroll in this course to protect your activities and stay Annoymous

What are the requirements?

  • a keen desire to learn more about cyber secret, hacking, forensics

What am I going to get from this course?

  • better understand of what is digital forensics
  • how is forensics perform
  • how to really stay annoymous
  • how is smartphone autopsy done

What is the target audience?

  • if you are looking for a hacking technique, this will not be the course for you
  • this course will show you various way of how forensics is done, and you can use that to better protect yourself

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Introduction First
Introduction
Preview
01:35
Section 2: Let Get Started
Anonymity on the Internet
Preview
11:14
Tor Hidden Services
11:42
Anti-Forensics
04:13
Section 3: Advanced Section
Forensics Imaging
08:34
Forensic recovery
08:29
Forensics with Autopsy
14:48
Section 4: Bonus Section
Bonus - IPhone Forensics
13:21

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Jon Webby, Professional Security Expert

A little introduction to myself. I have been working on computer for the whole of my life. The moment I have learn to use a computer I have dabble with it. As young as 8 years old when there is no Smartphone no Windows. Microsoft was still at a infant stage when all computer is running Dos 5.0.

I look thru all the command and execute all the game. Cracking all the copy protection (yes game at those time is copy protected by floppy disk) I amaze usually my parent and older adult. They are always wondering where did I learn all this. There wasn't internet yet not in those days, Some BBS is running. And from making friend with the hardware store. I learn how to disassemble a computer, tear all out and put it back in, I was even working free for a period of time just so I could learn about all the different kind of hardware.

Fast forward 30 years later. Technology changes, no longer is anybody using a floppy disk or even know what is a floppy disk. As technology advance so does the security compromise. In the 80s, your secret stay on your PC since there is no way a computer that is not link to anyway can get your secret out. In today, we are all connected to the Internet by PC, Laptop, Smartphone, Iphone, Tablets, even if you have anti virus or security suite install, can you believe you are staying anonymous?

Ready to start learning?
Take This Course