Home
  Previous Lecture Next Lecture  
Computer Forensics & Investigation Using Open Source Tools
Introduction To Computer Forensics Or Digital Forensics
What is Digital Forensics
Process of Digital Forensics Investigation
Digital Forensics and Crime investigation

Inevitability During Computer Forensics Investigation Legal Issues
Maintaining Chain Of Custody
Write-Blockers
Maintaining Integrity
Best Practices For Seizing Electronic Evidence

ImagingAcquisition of Operating System
Installing FTK imager
Create Forensics Image of HardDisk, Pendrive or any Storage Device

Computer Forensics Lab Setup
Installing Kali Linux Stable Version
Installing Kali Linux Live

Digital Forensics Investigation Analysis of Acquired Image
OS Forensics : Finding Artifacts in windows
Hashing and Data Fingerprinting In Digital Forensics
Windows Forensics Analysis Part - 1
Windows Forensics Analysis Part -2
Windows Forensics Analysis Part -3
Dump Analysis Using Bulk Extractor
Dump Analysis Using Foremost

Browser Forensics
Finding Browsing History, Bookmarks and lot of Evidence

Multimedia Forensics
Introduction to Steganography
Steganography Using Tool
Steganography Without Using Tool
Image Forensics

Tacking RAM Dump & Volatile Memory Analysis
How to Dump Ram Memory
Analysis of RAM Dump

Anti-Forensics Techniques & Detection
What is Anti-Forensics
Anti-Forensics Technique - 1
Anti-Forensics Technique - 2
Anti-Forensics Technique - 3

BONUS Cyber Crime Investigation
Website Crime Investigation

Oops! This lesson is locked

Please login or sign up to access this lesson

Login   Or   Sign Up