YoVDO

Data Hiding and Obfuscation in Security and Network Forensics - Lecture 10

Offered By: Bill Buchanan OBE via YouTube

Tags

Network Forensics Courses Encryption Courses Steganography Courses Hashing Courses Obfuscation Courses

Course Description

Overview

Learn about data hiding and obfuscation techniques in this 42-minute lecture from Prof Bill Buchanan OBE's "Introduction to Security and Network Forensics" book. Explore encryption, hashing, encoding, and exclusive methods for concealing information. Delve into probability analysis, tunneling, cover channels, and various data hiding techniques including file allocation table manipulation, file naming strategies, and file signature alterations. Gain valuable insights into network security and digital forensics as part of the Advanced Security and Digital Forensics module at Edinburgh Napier University.

Syllabus

Introduction
Encryption
Hashing
Encoding
Exclusive
Probability analysis
Tunneling
Cover Channels
Data Hiding
File Allocation Table
File Naming
File Signatures
Summary


Taught by

Bill Buchanan OBE

Related Courses

JavaScript: Security Essentials
LinkedIn Learning
Save and Load Files with C# in Unity
Coursera Project Network via Coursera
Reverse Engineering & Malware Analysis of .NET & Java
Udemy
Reverse Engineering 6: Reversing .NET with dnSpy
Udemy
Performing Basic Triage Analysis and Unpacking with x64dbg - Ransomware Analysis - Part 2
Dr Josh Stroschein via YouTube