Surviving Encryption: Essentials
5.0 (4 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
239 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Surviving Encryption: Essentials to your Wishlist.

Add to Wishlist

Surviving Encryption: Essentials

Encryption fundamentals from a computer forensic analyst's point-of-view
5.0 (4 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
239 students enrolled
Created by Michael Leclair
Last updated 2/2014
English
Price: $150
30-Day Money-Back Guarantee
Includes:
  • 3 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Encryption fundamentals
  • Overview of Cryptographic systems
  • Overview of Cryptanalysis Implementations of encryption
  • Password Psychology
View Curriculum
Requirements
  • Computer forensic experience
  • IT experience
Description

All SDF courses may now be found at SUMURI.COM. This course will remain live in UDEMY for existing students.

Today's computer analysts have become a "jack of all trades" for a variety of computer forensic skills in order to effectively deal with ever changing technologies. Many computer forensic analysts deal with encryption infrequently, however, as any seasoned investigator will tell you, when you do hit encryption you hit a lot of it. Encountering protected computer systems and files is becoming more common, therefore, having the fundamental skills to effectively deal with the challenge is vital. Surviving Encryption: Essentials takes a different approach to cryptanalysis by focusing on providing students with encryption fundamentals from an investigator's or computer forensic analyst's point of view. This is not a cryptography class- this class provides students with a working knowledge of terminology, how different types of encryption work, and examines research on common password patterns. Learn how to exploit the weakest part of any cipher- the human using it. No matter which forensic tool you choose SUMURI will teach you how to put intelligence behind your password attack.

Who is the target audience?
  • Computer forensic analysts
  • IT professionals
  • Investigators
Students Who Viewed This Course Also Viewed
Curriculum For This Course
Expand All 16 Lectures Collapse All 16 Lectures 03:11:13
+
Introduction
1 Lecture 16:31

Welcome to Surviving Encryption Essentials! Within each section please find a corresponding manual/ workbook to download. The passwords to open the files are:

EzjRmL#pIzWM

EzjRmL#pIzWM5

Preview 16:31
+
Encryption Fundamentals
6 Lectures 01:03:04

In this lesson fundamental terms, definitions & concepts will be introduced.

Encryption Fundamentals Part 1
06:51

In this practical you will compare protected files with a hex editor.

Practical #1
07:23

In this lesson fundamental terms, definitions & concepts will be introduced.

Encryption Fundamentals Part 2
10:36

In this lesson fundamental terms, definitions & concepts will be introduced.

Encryption Fundamentals Part 3
13:22

In this lesson fundamental terms, definitions & concepts will be introduced.

Encryption Fundamentals Part 4
13:29

In this lesson fundamental terms, definitions & concepts will be introduced.

Encryption Fundamentals Part 5
11:23

Encryption Fundamentals Quiz
6 questions
+
Overview of Cryptosystems & Algorithms
2 Lectures 34:40

In this lesson you will be given an overview of different cryptosystems and algorithms used for encryption.

Cryptosystems & Algorithms Part 1
17:10

In this lesson you will be given an overview of different cryptosystems and algorithms used for encryption.

Cryptosystems & Algorithms Part 2
17:30

Cryptosystems Quiz
2 questions
+
Overview of Cryptanalysis
2 Lectures 31:29

In this practical you will be provided with an overview of cryptanalysis.

Overview of Cryptanalysis Part 1
15:39

Overview of Cryptanalysis Part 2
15:50

Cryptananalysis Quiz
4 questions
+
Password Pattern Analysis
4 Lectures 44:44

In this practical we will go over common password patterns.

Password Pattern Analysis Part 1
13:25

Password Pattern Analysis Part 2
11:03

Password Pattern Analysis Part 3
12:55

Password Pattern Analysis Part 4
07:21

Password Pattern Quiz
7 questions
+
Conclusion
1 Lecture 00:45

Thanks for choosing SUMURI!

Check out other classes of the SDF series at http://sumuri.com/training/surviving-digital-forensics/

Follow me on Twitter @LeclairDF to get the latest happenings of the SDF series.

Check out our Blog at http://sumuri.com/about/news/

Check out our Youtube channel https://www.youtube.com/user/SumuriNews

Conclusion
00:45
About the Instructor
Michael Leclair
4.5 Average rating
311 Reviews
2,251 Students
15 Courses
Computer Forensic Analyst

Over twelve years of experience as a Computer Forensic Analyst, author and developer of computer forensic training and analysis tools. Specialties include: Windows forensics, Mac forensics, iOS forensics, Mac Server forensics & mobile device forensics. Creator of the "Surviving Digital Forensics" series and part of SUMURI's RECON for Mac OS X development team.

Certifications include: CFCE, CISSP, CCE, EnCE, A+, Network+

Regularly instruct law enforcement, government and corporate investigators both nationally and internationally in computer forensics.