Completed
DFS101: 1.1 Introduction to digital forensics
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Introduction to Digital Forensics
Automatically move to the next video in the Classroom when playback concludes
- 1 DFS101: 1.1 Introduction to digital forensics
- 2 DFS101: 1.2 Intro to Cybercrime and Networks
- 3 DFS101: 1.3 Cybersecurity and Cybercrime
- 4 DFS101: 2.1 Cybersecurity
- 5 DFS101: 2.2 How hackers hack
- 6 DFS101: 2.3 How to secure a Windows computer
- 7 DFS101: 2.4 How to secure a Linux computer
- 8 DFS101: 3.1 Intro to Computers
- 9 DFS101: 3.1 Intro to Computers II
- 10 DFS101: 3.2 Introduction to Network Analysis
- 11 DFS101: 3.3 Password attacks
- 12 DFS101: 4.1 Basics of Cybercrime Investigation
- 13 DFS101: 4.2 Digital Investigation Methods
- 14 DFS101: 4.3 Electronic Evidence
- 15 DFS101: 4.4 Documentation and Reporting for Digital Investigations
- 16 DFS101: 5.1 Digital Investigation Definition
- 17 DFS101: 5.2 Scientific Method in Digital Investigations
- 18 DFS101: 5.3 Digital Investigation Procedure
- 19 DFS101: 6.1 Data Storage
- 20 DFS101: 6.2 Data Structures
- 21 DFS101: 6.3 Data Acquisition
- 22 DFS101: 7.1 How to recover data
- 23 DFS101: 7.2 Data recovery with Photorec
- 24 DFS101: 7.3 Data recovery with tsk_recover
- 25 DFS101: 7.4 Data Recovery - The Sleuth Kit
- 26 DFS101: 8.1 Location and meaning of data
- 27 DFS101: 8.2 How to start a new case in Autopsy 4
- 28 DFS101: 8.3 Processing and analysis of a disk image with Autopsy 4 default modules
- 29 DFS101: 8.4 How to use hfind from the command line
- 30 DFS101: 8.5 How to add a hash database to Autopsy 4
- 31 DFS101: 9.1 Types of hacking
- 32 DFS101: 9.2 Malware
- 33 DFS101: 9.3 Social Engineering
- 34 DFS101: 10.1 RAM Acquisition and Analysis
- 35 DFS101: 10.2 Forensic Memory Acquisition in Windows - FTK Imager
- 36 DFS101: 10.3 Forensic Memory Acquisition in Linux - LiME
- 37 DFS101: 10.4 Digital Forensic Memory Analysis - strings, grep, and photorec
- 38 DFS101: 10.5 Digital Forensic RAM Analysis - Volatility
- 39 DFS101: 11.1 Mobile Device Investigations
- 40 DFS101: 11.2 Mobile Device Acquisition
- 41 DFS101: 12.1 International Nature of Cybercrime
- 42 DFS101: 12.2 Current State of International Cooperation
- 43 DFS101: 13.1 Research and the future of cybercrime investigation
- 44 DFS101: 13.2 Keeping up to date with digital forensics