Digital Forensics for Cyber Professionals

$49.99

Dive into the field of Cyber Security with this Digital Forensics for Cyber Professionals training course. Learn how to use open source tools to collect digital forensic information from Linux and Windows systems.  The Cyber Forensics field is red hot. Stake your claim now!

Length: 2 hrs

This title is available in the
Total Training All-Access library.

Subscribe Now

Description

With this Digital Forensics for Cyber Professionals training course, you will learn how to use open source tools to collect digital forensic information from Linux and Windows systems. You will also learn how to conduct static malware analysis of live ‘Ransomware’ using forensics tools and techniques.

By the time you’ve completed this course, you will understand how to use open source tools such as CAINE to do forensic analysis on live systems, as well as the basic and advanced techniques you will need to gain a grasp on GIAC and other Computer Forensic certifications.

This course provides demonstrations on how to use these tools in a step-by-step manner so you can start doing forensics work immediately on your own.


Sample clip

 

Digital Forensics for Cyber Professionals
 
1. The Digital Forensics Field
 Course Introduction (3:37)
 Forensics HD and Branded with Title (14:00)
 
2. Recovery and Reconstruction
 Recovering Deleted Files (17:02)
 Windows RegistryE-Mail Reconstruction (8:28)
 Deconstructing Files of Unknown Origin (5:20)
 
3. Reversing and Malware Analysis
 Reverse Engineering Windows Executables (5:32)
 Windows Live Response (13:11)
 Linux Live Response (10:59)
 Sandboxing and Malware Analysis (4:33)
 
4. Forensics Tools and Storage
 CAINE (5:19)
 USB Forensic Analysis (9:48)
 Storage Encryption (18:41)
 Windows Encrypting File System (7:36)

Chad Russell has been in the CyberSecurity industry for over 15 years. He has taught Microsoft Engineering courses as a Certified trainer, managed teams of security engineers and analysts for an internet banking provider, and has been an information security consultant working for companies including SAP, Microsoft and Oracle.

He leads and conducts ‘Security Risk Assessments’ for customers throughout North America with an emphasis on cloud security, identity governance, network security, social engineering, mobile security, breach assessments, database security, and access management.

Over the past 15 years he has held numerous certifications including CISSP, CCNP, MCSE and MCDBA certifications, and has a B.S. in Computer Science from Excelsior College.

You may also like…