Course Curriculum
| Course Overview | |||
| Course Overview | 00:06:00 | ||
| Building Your Forensics Lab Environment Using VirtualBox | |||
| Lab – Installing CSI Linux | 00:13:00 | ||
| Lab – Creating a Kali Live (Forensic Mode) VM Using VirtualBox | 00:06:00 | ||
| Lab – Create a Virtual Install Kali Image Using VirtualBox | 00:07:00 | ||
| Lab – Create Virtual Install of Windows 10 Using VirtualBox | 00:08:00 | ||
| Install Additional Tool Using Katoolin3 | 00:10:00 | ||
| Using Kali Forensic Mode and Autopsy | |||
| Lab – Simulate Creating a Disk Image for a Forensic Analysis | 00:11:00 | ||
| Lab – Examining a forensic Disk Image Using Autopsy | 00:12:00 | ||
| Digital Forensics Case Management | |||
| Lab -Digital Forensics Using Autopsy Part I | 00:11:00 | ||
| Lab – Digital Forensics Using Autopsy Part II | 00:07:00 | ||
| Lab – Installing the WebMap-Nmap Dashboard | 00:12:00 | ||
| Open-source intelligence (OSINT) | |||
| Lab – Conducting OSINT Using CSI Linux Investigator | 00:08:00 | ||
| Lab – Find Social Media Accounts Using Sherlock | 00:07:00 | ||
| Computer Forensics | |||
| Attaching an External USB Device in Kali | 00:07:00 | ||
| Lab – Memory Forensics Using the Volatility Framework | 00:18:00 | ||
| Lab – Analyzing the Windows Registry for Evidence | 00:14:00 | ||
| Lab – Analyzing the Windows Registry for Evidence | 00:14:00 | ||
| Using Shodan to Search for Vulnerable devices | |||
| Lab – Preparing CSI Investigator to Use Shodan | 00:05:00 | ||
| Lab – Using Shodan to Find Vulnerable Devices | 00:16:00 | ||
| Lab – Using Shodan to Search for Vulnerable Databases | 00:08:00 | ||
| Stenography | |||
| Lab – Using the EXIFtool to Read and Write EXIF Tags | 00:11:00 | ||
| Using the EXIFtool to Read and Write EXIF Tags | 00:10:00 | ||
| Network forensics Using Wireshark | |||
| Overview of Wireshark 3.2 | 00:11:00 | ||
| Wireshark Capture Options | 00:07:00 | ||
| Wireshark Toolbar Icons | 00:04:00 | ||
| Lab – Capturing a 3-way TCP Handshake Using Wireshark | 00:05:00 | ||
| Lab – Installing a Wireless Adapter in Kali | 00:09:00 | ||
| Lab – Hacking a Wireless Network Using Kali Linux | 00:14:00 | ||
| Capturing Wireless Traffic Using Wireshark | 00:05:00 | ||
| Practice What You Have learned | |||
| Lab – CTF Lab Build for HA: Forensics | 00:11:00 | ||
| Lab – Capture flag #1 | 00:12:00 | ||
| Lab – Capture flag #2 | 00:10:00 | ||
| Lab – Capture flag #3 | 00:20:00 | ||
| Lab – Capture flag #4 | 00:09:00 | ||
35 STUDENTS ENROLLED

