Digital Forensics Using Kali Linux

Digital Forensics Using Kali Linux

Digital investigation and analysis made easy with Kali Linux

Bestseller
Created By: Sunil Gupta
15.87 9.52

About This Course

Forensics is becoming increasingly important in today's digital age, in which many crimes are committed using digital technologies. Kali Linux is a Linux-based distribution used mainly for penetration testing and digital forensics. It offers a wide range of tools forto support forensic investigations and incident response mechanisms. This video course will equip you with the forensic capabilities provided by Kali Linux.

In this course, you will be utilizing the latest version of Kali Linux and its Sleuth Kit. We will cover the fundamentals of digital forensics and learn about the various formats for file storage, including secret hiding places unseen by the end user or even the OS itself. Then, you will learn how to create forensic images of data and maintain integrity using the hashing tools. You will work with powerful tools that cater for all aspects of full digital forensic investigations, from hashing to reporting. We will perform all the techniques related to evidence acquisition, preservation, and analysis— and all using the various tools within Kali Linux.

By the end of this course, you will be confident about implementing and working with all the areas of digital forensics—acquisition, extraction, analysis, and presentation—using key Kali Linux tools.

Other Information

  • Certificate will provided in this course on Completion
  • Full lifetime access
  • Available on Mobile & Laptop

What Students Will Learn In Your Course?

  • Work on a wide range of forensics scenario with the latest range of tools & techniques
  • Use the techniques of the carving process to recover deleted files, folders and pictures
  • Explore the working of Image Acquisition techniques
  • Demystify Memory Imaging Process
  • Perform Memory Analysis of Image Files
  • Work with tools & techniques to generate forensic reports and documentation

Are There Any Course Requirements Or Prerequisites?

Basic knowledge of Kali Linux is beneficial but not mandatory.

Who Are Your Target Students?

This course is suitable for forensics and digital investigators, security analysts, or any stakeholder interested in learning digital forensics using Kali Linux.

Course Content

  • 49 lectures
  • 03:50:45
  • The Course Overview
    00:02:00
  • Digital Forensics
    00:01:43
  • How to Get Most out of the Course?
    00:01:42
  • Virtual Machine
    00:03:17
  • Kali Linux Installation
    00:03:07
  • Windows Installation
    00:04:02
  • Forensics Imaging Overview
    00:02:27
  • dcfldd and dc3dd
    00:06:04
  • Drive Acquisition Using FTK Imager
    00:08:19
  • Drive Acquisition Using ewfacquire Tool
    00:06:46
  • Image Acquisition Using Guymager Tool
    00:06:02
  • Sleuth Kit Overview
    00:02:11
  • File System Analysis
    00:01:45
  • Registry Analysis Using reglookup Tool
    00:07:49
  • Registry Analysis Using regripper Tool
    00:05:30
  • Analyze Email and Browser Artifacts
    00:05:57
  • Analyze PDF Files Using PDF-Parser Tool
    00:07:38
  • Analyze PDF Files Using peepdf Tool
    00:04:23
  • Page File Analysis with Page Brute and Yara
    00:07:45
  • Analyze Malware Files Using File Analysis Tool
    00:04:42
  • Forensics Carving Overview
    00:01:48
  • File Recovery Using Foremost Tool
    00:05:36
  • Recover Deleted Files Using Scalpel Tool
    00:04:24
  • Recover Pictures Using recoverjpeg Tool
    00:04:06
  • Recover Plain Text Passwords from Memory
    00:06:49
  • Recover Clipboard Content from Memory
    00:04:31
  • Analyze Suspicious File Using pestudio Tool
    00:02:52
  • File Carving Using PhotoRec Tool
    00:04:24
  • Data Extraction and Memory Analysis with Bulk-Extractor
    00:05:24
  • Autopsy Platform Overview
    00:02:27
  • Building a New Case in Autopsy
    00:04:27
  • Generate Hashes of Image Files
    00:06:35
  • Windows Image Analysis Using Autopsy
    00:08:00
  • Android Image Analysis Using Autopsy
    00:10:29
  • Memory Forensics Overview
    00:01:57
  • Physical Memory Acquisition Using WinPmem
    00:03:46
  • Memory Acquisition Using FTK Imager
    00:03:27
  • Volatility Tool Overview
    00:03:37
  • Memory Analysis Using Volatility Tool
    00:06:14
  • Analyze Malware Infected System‚Äôs Memory File
    00:04:49
  • Network Forensics Overview
    00:02:22
  • Wireshark Tool Overview
    00:05:06
  • Demo: Network Traffic
    00:05:36
  • Demo: Analyze Network Traffic
    00:06:43
  • Network Forensics Techniques
    00:03:49
  • Reporting Overview
    00:02:32
  • Reporting Tools
    00:07:57
  • Documentation
    00:05:38
  • Summary
    00:02:11
Image

Packt Publication

  • 4.48 (3)
  • 13 Reviews
  • 3 Students
  • 935 Courses