Data Hiding and Obfuscation in Security and Network Forensics - Lecture 10
Offered By: Bill Buchanan OBE via YouTube
Course Description
Overview
Learn about data hiding and obfuscation techniques in this 42-minute lecture from Prof Bill Buchanan OBE's "Introduction to Security and Network Forensics" book. Explore encryption, hashing, encoding, and exclusive methods for concealing information. Delve into probability analysis, tunneling, cover channels, and various data hiding techniques including file allocation table manipulation, file naming strategies, and file signature alterations. Gain valuable insights into network security and digital forensics as part of the Advanced Security and Digital Forensics module at Edinburgh Napier University.
Syllabus
Introduction
Encryption
Hashing
Encoding
Exclusive
Probability analysis
Tunneling
Cover Channels
Data Hiding
File Allocation Table
File Naming
File Signatures
Summary
Taught by
Bill Buchanan OBE
Related Courses
Data Structures: An Active Learning ApproachUniversity of California, San Diego via edX Blockchain Basics
University at Buffalo via Coursera Intro to Data Structures and Algorithms
Google via Udacity Introduction to Blockchain Technologies
INSEAD via Coursera Data Structures
CEC via Swayam