Forensic Computing - Part 1
Offered By: Bill Buchanan OBE via YouTube
Course Description
Overview
Dive into the world of forensic computing with this comprehensive first part of a two-part lecture series. Learn about basic procedures, collection phase, data preservation, and various data hiding techniques including obfuscation, steganography, and covert channels. Explore IP TCP cover channels, DNS cover channels, and HTTP cover channels. Gain insights into network traffic analysis, including Sun flag, DNS activity, MAC address, and broadcasts. Access additional resources and the second part of the lecture through provided links to enhance your understanding of forensic computing principles and practices.
Syllabus
Intro
Basic Procedures
Collection Phase
Data Preservation
Data Hiding
Obfuscation
stenography
covert channels
IP TCP cover channels
DNS cover channels
HTTP cover channels
Network traffic
Sun flag
DNS activity
MAC address
Broadcasts
Taught by
Bill Buchanan OBE
Related Courses
Observing and Analysing Performance in SportOpenLearning Statistics: Making Sense of Data
University of Toronto via Coursera Financial Planning
TAFE NSW via Open2Study Mobiles for Development
Indian Institute of Technology Kanpur via Independent Valoración de futbolistas
Universitat Politècnica de València via UPV [X]