Sorry, your browser is not supported
To have the best experience using Skillshare, we recommend that you use one of these supported browsers.
Play Speed
  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x
28 Videos (3h 18m)
    • The Course Overview

      4:14
    • Brief Introduction to Digital Forensics

      6:13
    • Downloading and Installing Kali Linux

      6:23
    • Introduction to Forensic Imaging

      11:06
    • Overview of dcfldd and dc3dd

      4:29
    • Drive Imaging with dc3dd

      8:35
    • Android Device Imaging with dc3dd

      11:53
    • Image Acquisition with Guymager

      4:59
    • Overview of the Sleuth Kit and Filesystem Analysis

      12:45
    • Windows Registry Analysis with RegRipper

      9:24
    • Extracting and Analyzing Browser, E-mail, and IM Artifacts

      12:28
    • File Analysis Tools

      14:28
    • Building a Super-Timeline of the Events

      10:26
    • File Carving Overview

      6:54
    • File Carving Tools

      8:26
    • Extracting Data with Bulk Extractor

      5:01
    • Autopsy 4 Overview and Installation

      4:58
    • Analysis of a Windows Image with Autopsy

      10:24
    • Analysis of an Android Image with Autopsy

      4:50
    • Introduction to Memory Forensics and Acquisition

      3:58
    • Memory Acquisition

      4:03
    • Introduction to Volatility

      3:10
    • Memory Analysis with Volatility

      4:23
    • Introduction to Network Forensics

      5:05
    • Capturing Network Traffic with Wireshark

      6:14
    • Network Traffic Analysis with Wireshark

      4:09
    • Introduction to Reporting

      3:33
    • Documentation and Reporting Tools

      5:12

About This Class

Simplify the art of digital forensics and analysis with Kali Linux


About This Video
Learn and practice through various tools and techniques that leverage the Kali Linux distribution
Extract and recover data and perform successful forensic analysis and investigations
Perform professional-quality forensics through ethical means, and solve forensic challenges in real-world scenarios


In Detail
Kali Linux is the most comprehensive distributions for penetration testing and ethical hacking. It has some of the most popular forensics tools available to conduct formal forensics and investigations and perform professional-level forensics.
This video course teaches you all about the forensic analysis of computers and mobile devices that leverage the Kali Linux distribution. You’ll get hands-on, seeing how to conduct each phase of the digital forensics process: acquisition, extraction, analysis, and presentation, using the rich set of open source tools that Kali Linux provides for each activity.
We start by showing you how to use the tools (dc3dd in particular) to acquire images from the media to be analyzed, either hard drives, mobile devices, thumb drives, or memory cards. The course presents the Autopsy forensic suite and other specialized tools,such as the Sleuth Kit and RegRipper, to extract and analyze various artifacts from a Windows image. It also shows how to perform the analysis of an Android device image using Autopsy. Next, we cover file carving and the recovery of deleted data, and then the process of acquiring and analyzing RAM memory (live analysis) using the Volatility framework.
Another topic is treated in the course, that is network forensics; indeed, the course covers how to capture and analyze network data packets, with tools like Wireshark and Xplico.
Finally, we demonstrate how to report and present digital evidence found during the analysis. By the end of the course, you will be able to extract and recover data, analyze the acquired data, and report and present digital evidence from a device.

2

Students

--

Projects

0

Reviews (0)

Packt Publishing

Packt is the leading UK provider of Tech

Hello, we are Packt.

Packt is the leading UK provider of Technology eBooks, Coding eBooks, Videos and Blogs; helping IT professionals to put software to work.

Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals.

Working towards that vision, we have published over 5000 books and videos so far, providing IT professionals with the act...

See full profile

Technology Web Development IT Security