Completed
DFS101: 7.3 Data recovery with tsk_recover
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Introduction to Digital Forensics
Automatically move to the next video in the Classroom when playback concludes
- 1 DFS101: 1.1 Introduction to digital forensics
- 2 DFS101: 1.2 Intro to Cybercrime and Networks
- 3 DFS101: 1.3 Cybersecurity and Cybercrime
- 4 DFS101: 2.1 Cybersecurity
- 5 DFS101: 2.2 How hackers hack
- 6 DFS101: 2.3 How to secure a Windows computer
- 7 DFS101: 2.4 How to secure a Linux computer
- 8 DFS101: 3.1 Intro to Computers
- 9 DFS101: 3.1 Intro to Computers II
- 10 DFS101: 3.2 Introduction to Network Analysis
- 11 DFS101: 3.3 Password attacks
- 12 DFS101: 4.1 Basics of Cybercrime Investigation
- 13 DFS101: 4.2 Digital Investigation Methods
- 14 DFS101: 4.3 Electronic Evidence
- 15 DFS101: 4.4 Documentation and Reporting for Digital Investigations
- 16 DFS101: 5.1 Digital Investigation Definition
- 17 DFS101: 5.2 Scientific Method in Digital Investigations
- 18 DFS101: 5.3 Digital Investigation Procedure
- 19 DFS101: 6.1 Data Storage
- 20 DFS101: 6.2 Data Structures
- 21 DFS101: 6.3 Data Acquisition
- 22 DFS101: 7.1 How to recover data
- 23 DFS101: 7.2 Data recovery with Photorec
- 24 DFS101: 7.3 Data recovery with tsk_recover
- 25 DFS101: 7.4 Data Recovery - The Sleuth Kit
- 26 DFS101: 8.1 Location and meaning of data
- 27 DFS101: 8.2 How to start a new case in Autopsy 4
- 28 DFS101: 8.3 Processing and analysis of a disk image with Autopsy 4 default modules
- 29 DFS101: 8.4 How to use hfind from the command line
- 30 DFS101: 8.5 How to add a hash database to Autopsy 4
- 31 DFS101: 9.1 Types of hacking
- 32 DFS101: 9.2 Malware
- 33 DFS101: 9.3 Social Engineering
- 34 DFS101: 10.1 RAM Acquisition and Analysis
- 35 DFS101: 10.2 Forensic Memory Acquisition in Windows - FTK Imager
- 36 DFS101: 10.3 Forensic Memory Acquisition in Linux - LiME
- 37 DFS101: 10.4 Digital Forensic Memory Analysis - strings, grep, and photorec
- 38 DFS101: 10.5 Digital Forensic RAM Analysis - Volatility
- 39 DFS101: 11.1 Mobile Device Investigations
- 40 DFS101: 11.2 Mobile Device Acquisition
- 41 DFS101: 12.1 International Nature of Cybercrime
- 42 DFS101: 12.2 Current State of International Cooperation
- 43 DFS101: 13.1 Research and the future of cybercrime investigation
- 44 DFS101: 13.2 Keeping up to date with digital forensics