YoVDO

Forensic Computing - Part 1

Offered By: Bill Buchanan OBE via YouTube

Tags

Digital Forensics Courses Data Collection Courses Network Forensics Courses Steganography Courses

Course Description

Overview

Dive into the world of forensic computing with this comprehensive first part of a two-part lecture series. Learn about basic procedures, collection phase, data preservation, and various data hiding techniques including obfuscation, steganography, and covert channels. Explore IP TCP cover channels, DNS cover channels, and HTTP cover channels. Gain insights into network traffic analysis, including Sun flag, DNS activity, MAC address, and broadcasts. Access additional resources and the second part of the lecture through provided links to enhance your understanding of forensic computing principles and practices.

Syllabus

Intro
Basic Procedures
Collection Phase
Data Preservation
Data Hiding
Obfuscation
stenography
covert channels
IP TCP cover channels
DNS cover channels
HTTP cover channels
Network traffic
Sun flag
DNS activity
MAC address
Broadcasts


Taught by

Bill Buchanan OBE

Related Courses

Information security - IV
Indian Institute of Technology Madras via Swayam
Hacking Laboratuvarınızı Oluşturun
Udemy
Digital Forensics
Uttarakhand Open University, Haldwani via Swayam
Digital Forensics Concepts
Infosec via Coursera
Enumerating the Network Infrastructure as a Forensics Analyst
Pluralsight