YoVDO

Forensic Computing - Part 1

Offered By: Bill Buchanan OBE via YouTube

Tags

Digital Forensics Courses Data Collection Courses Network Forensics Courses Steganography Courses

Course Description

Overview

Dive into the world of forensic computing with this comprehensive first part of a two-part lecture series. Learn about basic procedures, collection phase, data preservation, and various data hiding techniques including obfuscation, steganography, and covert channels. Explore IP TCP cover channels, DNS cover channels, and HTTP cover channels. Gain insights into network traffic analysis, including Sun flag, DNS activity, MAC address, and broadcasts. Access additional resources and the second part of the lecture through provided links to enhance your understanding of forensic computing principles and practices.

Syllabus

Intro
Basic Procedures
Collection Phase
Data Preservation
Data Hiding
Obfuscation
stenography
covert channels
IP TCP cover channels
DNS cover channels
HTTP cover channels
Network traffic
Sun flag
DNS activity
MAC address
Broadcasts


Taught by

Bill Buchanan OBE

Related Courses

Observing and Analysing Performance in Sport
OpenLearning
Statistics: Making Sense of Data
University of Toronto via Coursera
Financial Planning
TAFE NSW via Open2Study
Mobiles for Development
Indian Institute of Technology Kanpur via Independent
Valoración de futbolistas
Universitat Politècnica de València via UPV [X]