We guarantee that all our online courses will meet or exceed your
expectations. If you are not fully satisfied with a course - for
any reason at all - simply request a full refund. We guarantee no
hassles. That's our promise to you.
Go ahead and order with confidence!
| Course Overview | |||
| Course Overview | |||
| Building Your Forensics Lab Environment Using VirtualBox | |||
| Lab – Installing CSI Linux | |||
| Lab – Creating a Kali Live (Forensic Mode) VM Using VirtualBox | |||
| Lab – Create a Virtual Install Kali Image Using VirtualBox | |||
| Lab – Create Virtual Install of Windows 10 Using VirtualBox | |||
| Install Additional Tool Using Katoolin3 | |||
| Using Kali Forensic Mode and Autopsy | |||
| Lab – Simulate Creating a Disk Image for a Forensic Analysis | |||
| Lab – Examining a forensic Disk Image Using Autopsy | |||
| Digital Forensics Case Management | |||
| Lab -Digital Forensics Using Autopsy Part I | |||
| Lab – Digital Forensics Using Autopsy Part II | |||
| Lab – Installing the WebMap-Nmap Dashboard | |||
| Open-source intelligence (OSINT) | |||
| Lab – Conducting OSINT Using CSI Linux Investigator | |||
| Lab – Find Social Media Accounts Using Sherlock | |||
| Computer Forensics | |||
| Attaching an External USB Device in Kali | |||
| Lab – Memory Forensics Using the Volatility Framework | |||
| Lab – Acquiring a Forensic Copy of the Windows Registry | |||
| Lab – Analyzing the Windows Registry for Evidence | |||
| Using Shodan to Search for Vulnerable devices | |||
| Lab – Preparing CSI Investigator to Use Shodan | |||
| Lab – Using Shodan to Find Vulnerable Devices | |||
| Lab – Using Shodan to Search for Vulnerable Databases | |||
| Stenography | |||
| Lab – Using the EXIFtool to Read and Write EXIF Tags | |||
| Using the EXIFtool to Read and Write EXIF Tags | |||
| Network forensics Using Wireshark | |||
| Overview of Wireshark 3.2 | |||
| Wireshark Capture Options | |||
| Wireshark Toolbar Icons | |||
| Lab – Capturing a 3-way TCP Handshake Using Wireshark | |||
| Lab – Installing a Wireless Adapter in Kali | |||
| Lab – Hacking a Wireless Network Using Kali Linux | |||
| Capturing Wireless Traffic Using Wireshark | |||
| Practice What You Have learned | |||
| Lab – CTF Lab Build for HA: Forensics | |||
| Lab – Capture flag #1 | |||
| Lab – Capture flag #2 | |||
| Lab – Capture flag #3 | |||
| Lab – Capture flag #4 | |||