• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.
Resource icon

Beyond the Basics Mastering Advanced Digital Forensics Techniques 8GB 2024

No permission to download
This advanced course is designed for digital forensics professionals looking to enhance their expertise beyond foundational skills. It delves into sophisticated forensic methods, including advanced file system analysis, memory forensics, network traffic analysis, and reverse engineering. Participants will learn cutting-edge techniques for identifying, preserving, and analyzing digital evidence in complex cybercrime investigations. Through hands-on labs and real-world case studies, students will develop a deeper understanding of forensic tools and methodologies, empowering them to solve intricate incidents, conduct in-depth investigations, and provide expert testimony in legal settings.

Syllabus​


Code:
[4.0K]  .[4.0K]  .
├── [4.0K]  1. Installation and New Case Creation
│   ├── [ 21K]  1.1. Practical case.html
│   ├── [ 21K]  1.2. Install Belkasoft Evidence Center X.html
│   ├── [6.9M]  1.3. Create a new case.ts
│   └── [4.0K]  1.4. Add a data source (E01 image)
│       ├── [ 22K]  1.4. Add a data source (E01 image).html
│       ├── [ 21M]  1.4. Add a data source (E01 image).ts
│       ├── [7.0G]  BelkaDay_SUSPECT_LAPTOP.7z
│       ├── [ 22K]  NSRL-base.txt
├── [4.0K]  2. Internet Artifacts and Link Analysis
│   ├── [ 19K]  2.1. Work with discovered artifacts.html
│   ├── [ 18M]  2.1. Work with discovered artifacts.ts
│   ├── [2.2M]  2.2. Analyze different types of devices.html
│   ├── [ 13M]  2.3. Use mini-timeline, global, and local filters.ts
│   ├── [1.6M]  2.4. Connection Graph (article).html
│   ├── [ 16M]  2.5. Belkasoft Connection Graph (video).ts
├── [4.0K]  3. Windows Artifact and Countering Anti-forensic measures
│   ├── [ 19K]  3.1. What Artifacts Can be Analyzed from a Windows System.html
│   ├── [ 24M]  3.1. What Artifacts Can be Analyzed from a Windows System.ts
│   ├── [7.4M]  3.2. Registry artifacts analysis.ts
│   ├── [ 21K]  3.3. Countering anti-forensics efforts__html
│   ├── [ 12M]  3.3.1 Countering Anti Forensic Efforts Introduction.mp4
│   ├── [ 28M]  3.3.2 Basic Anti Forensics Techniques.mp4
│   ├── [ 30M]  3.3.3 Advanced Anti Forensics Techniques.mp4
│   ├── [ 64M]  3.3.4 Countering Anti Forensic Efforts Demo.mp4
│   ├── [3.6M]  3.4. How to analyze Windows 10 Timeline__html
├── [4.0K]  4. Carving and Memory Analysis
│   ├── [ 27M]  4.1. Carving features in Belkasoft X.ts
│   ├── [2.5M]  4.2. Carving and its implementation in digital forensics.html
│   ├── [ 20K]  4.3. Discovering evidence with Live RAM analysis.html
│   ├── [ 23M]  4.3. Discovering evidence with Live RAM analysis.ts
├── [4.0K]  5. Narrow your search Timeline and Hashset analysis
│   ├── [238K]  5.1. Using Timeline (article).html
│   ├── [8.3M]  5.2. Video tutorial on Belkasoft Timeline.ts
│   ├── [104K]  5.3. Hashset analysis in Belkasoft X.html
│   ├── [ 20K]  5.4. Run hashset analysis.html
└── [   0]  listado.txt

6 directories, 30 files
Back
Top