• Home
  • Courses
  • About Us
  • Contact
  • Mores
    • Tech Services
    • Store
    • Tech Blog
    • FAQs
    Have any question?
    +91-9460053140
    [email protected]
    RegisterLogin
    THCBin LearningTHCBin Learning
    • Home
    • Courses
    • About Us
    • Contact
    • Mores
      • Tech Services
      • Store
      • Tech Blog
      • FAQs

      IT & Security

      • Home
      • All courses
      • IT & Security
      • Digital Forensics with Kali Linux

      Digital Forensics with Kali Linux

      User Avatar
      Packt Publishing
      IT & Security, Technology
      (0 review)
      $7.49 Free
      Digital Forensics with Kali Linux
      • Overview
      • Curriculum
      • Instructor
      • Reviews

      Simplify the art of digital forensics and analysis with Kali Linux

      About This Video
      Learn and practice through various tools and techniques that leverage the Kali Linux distribution
      Extract and recover data and perform successful forensic analysis and investigations
      Perform professional-quality forensics through ethical means, and solve forensic challenges in real-world scenarios

      In Detail
      Kali Linux is the most comprehensive distributions for penetration testing and ethical hacking. It has some of the most popular forensics tools available to conduct formal forensics and investigations and perform professional-level forensics.
      This video course teaches you all about the forensic analysis of computers and mobile devices that leverage the Kali Linux distribution. You’ll get hands-on, seeing how to conduct each phase of the digital forensics process: acquisition, extraction, analysis, and presentation, using the rich set of open source tools that Kali Linux provides for each activity.
      We start by showing you how to use the tools (dc3dd in particular) to acquire images from the media to be analyzed, either hard drives, mobile devices, thumb drives, or memory cards. The course presents the Autopsy forensic suite and other specialized tools,such as the Sleuth Kit and RegRipper, to extract and analyze various artifacts from a Windows image. It also shows how to perform the analysis of an Android device image using Autopsy. Next, we cover file carving and the recovery of deleted data, and then the process of acquiring and analyzing RAM memory (live analysis) using the Volatility framework.
      Another topic is treated in the course, that is network forensics; indeed, the course covers how to capture and analyze network data packets, with tools like Wireshark and Xplico.
      Finally, we demonstrate how to report and present digital evidence found during the analysis. By the end of the course, you will be able to extract and recover data, analyze the acquired data, and report and present digital evidence from a device.

      Course Features

      • Lectures 28
      • Quizzes 0
      • Language English
      • Students 1
      • Assessments Yes
      CoursesTechnologyIT & SecurityDigital Forensics with Kali Linux
      • Course 28

        • Lecture1.1
          1. The Course Overview 04 min
        • Lecture1.2
          2. Brief Introduction to Digital Forensics 06 min
        • Lecture1.3
          3. Downloading and Installing Kali Linux 06 min
        • Lecture1.4
          4. Introduction to Forensic Imaging 11 min
        • Lecture1.5
          5. Overview of dcfldd and dc3dd 04 min
        • Lecture1.6
          6. Drive Imaging with dc3dd 09 min
        • Lecture1.7
          7. Android Device Imaging with dc3dd 12 min
        • Lecture1.8
          8. Image Acquisition with Guymager 05 min
        • Lecture1.9
          9. Overview of the Sleuth Kit and Filesystem Analysis 13 min
        • Lecture1.10
          10. Windows Registry Analysis with RegRipper 09 min
        • Lecture1.11
          11. Extracting and Analyzing Browser, E-mail, and IM Artifacts 13 min
        • Lecture1.12
          12. File Analysis Tools 14 min
        • Lecture1.13
          13. Building a Super-Timeline of the Events 10 min
        • Lecture1.14
          14. File Carving Overview 07 min
        • Lecture1.15
          15. File Carving Tools 08 min
        • Lecture1.16
          16. Extracting Data with Bulk Extractor 05 min
        • Lecture1.17
          17. Autopsy 4 Overview and Installation 05 min
        • Lecture1.18
          18. Analysis of a Windows Image with Autopsy 10 min
        • Lecture1.19
          19. Analysis of an Android Image with Autopsy 05 min
        • Lecture1.20
          20. Introduction to Memory Forensics and Acquisition 04 min
        • Lecture1.21
          21. Memory Acquisition 04 min
        • Lecture1.22
          22. Introduction to Volatility 03 min
        • Lecture1.23
          23. Memory Analysis with Volatility 04 min
        • Lecture1.24
          24. Introduction to Network Forensics 05 min
        • Lecture1.25
          25. Capturing Network Traffic with Wireshark 06 min
        • Lecture1.26
          26. Network Traffic Analysis with Wireshark 04 min
        • Lecture1.27
          27. Introduction to Reporting 03 min
        • Lecture1.28
          28. Documentation and Reporting Tools 05 min
      author avatar
      Packt Publishing

      Packt is the leading UK provider of Tech

      Hello, we are Packt.

      Packt is the leading UK provider of Technology eBooks, Coding eBooks, Videos and Blogs; helping IT professionals to put software to work.

      Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals.

      Working towards that vision, we have published over 5000 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools.

      Reviews

      Average Rating

      0
      0 rating

      Detailed Rating

      5
      0%
      4
      0%
      3
      0%
      2
      0%
      1
      0%
      • Overview
      • Curriculum
      • Instructor
      • Reviews
      $7.49 Free
      • Share:

      You May Like

      Learn Hacking WiFi Networks Using Kali Linux 2.0 Read More
      Saad Sarraj

      Learn Hacking WiFi Networks Using Kali Linux 2.0

      7
      0
      Free
      Become Hacker (Beginner to Expert) Read More
      THCBin

      Become Hacker (Beginner to Expert)

      4
      0
      Free
      Cloud Ethical Hacking : Use Kali Linux on Amazon AWS Read More
      FeltSecure Labs

      Cloud Ethical Hacking : Use Kali Linux on Amazon AWS

      4
      0
      Free

      Popular Courses

      Facebook Page Masterclass: Use It to Grow Your Business

      Facebook Page Masterclass: Use It to Grow Your Business

      $5.99 Free
      Learn Man In The Middle Attacks From Scratch

      Learn Man In The Middle Attacks From Scratch

      $8.99 Free
      Typographic Logos: Typography and Lettering for Logo Design

      Typographic Logos: Typography and Lettering for Logo Design

      $4.99 Free

      Follow Us

      Advertisement

      logo-eduma-the-best-lms-wordpress-theme

      +91-9460053140

      [email protected]

      Company

      • Tech Services
      • Tech Blog
      • Store
      • Become a Teacher

      Links

      • About Us
      • Profile
      • Courses

      Support

      • Become a Teacher
      • Contact
      • DMCA
      • FAQs

      Recommend

      • QR Code Generator
      • URL Shortener
      • Resume Builder
      • Android SVG to Vector Drawable

      © THCBin Learning 2018 - 20. Powered By THCBin

      • Privacy Policy
      • Terms And Conditions
      • Sitemap

      Become An Instructor?

      Join with us as an instructors and earn money hassle free!

      Get Started Now

      Connect with

      Login with Google Login with Facebook Login with LinkedIn

      Login with your site account

      Lost your password?

      Not a member yet? Register now

      Register a new account


      Are you a member? Login now

      Modal title

      Message modal