YoVDO

Forensic Computing - Procedures, Data Preservation, and Covert Channels - Part 1

Offered By: Bill Buchanan OBE via YouTube

Tags

Digital Forensics Courses Network Forensics Courses Steganography Courses Data Recovery Courses Metadata Analysis Courses

Course Description

Overview

Explore the fundamentals of forensic computing in this comprehensive tutorial covering basic procedures, data collection, preservation techniques, and various methods of data hiding. Learn about obfuscation tactics, file manipulation, and metadata analysis. Delve into steganography, with a focus on JPEG files, and discover covert channels in network protocols such as IP, TCP, DNS, and HTTP. Gain insights into analyzing network traffic, including Sun Flag, DNS activity, MAC addresses, and broadcasts. This tutorial serves as the first part of a two-part series, providing a solid foundation for understanding digital forensics techniques and methodologies.

Syllabus

Intro
Basic Procedures
Collection Phase
Data Preservation
Data Hiding
Obfuscation
Changing File Names
Deleted Files
Metadata
stenography
JPEG
Covert Channels
IP TCP Covert Channels
DNS Covert Channels
HTTP Covert Channels
Network Traffic
Sun Flag
DNS Activity
MAC Address
Broadcasts


Taught by

Bill Buchanan OBE

Related Courses

Extensions, Frameworks, & Integrations Used with Zeek
Pluralsight
OSINT
Pennsylvania State University via YouTube
Data Catalog: Qwik Start
Google Cloud via Coursera
Data Artifacts, Analysis Results and Reporting in Autopsy
DFIRScience via YouTube
Elucidata's Bulk RNA-Seq OmixAtlas - Effortless Dataset Discovery and Retrieval
Bioinformagician via YouTube