Stone River eLearning - Certified Digital Forensics Examiner (CDFE)


Stone River eLearning - Certified Digital Forensics Examiner (CDFE)

Stone River eLearning - Certified Digital Forensics Examiner (CDFE)
English | Size: 9.10 GB
Genre: eLearning

Download Now

Diamond Cut Forensics10 Audio Laboratory 10.50



Diamond Cut Forensics10 Audio Laboratory 10.50
Diamond Cut Forensics10 Audio Laboratory 10.50 | 60.4 Mb
DCForensics10 Audio Laboratory Unlocking the Mysteries of Forensics Audio Files Surveillance Audio Recording Forensics Audio.

Download Now

Digital Forensic Series: Computer Forensics

Digital Forensic Series: Computer Forensics
Digital Forensic Series: Computer Forensics
13,5h | Video: .MP4, 1280x720, 30 fps(r) | Audio: AAC, 44100 Hz, 2ch | 5,7 GB
Genre: eLearning | Language: English

Download Now

Diamond Cut Forensics10 Audio Laboratory 10.50 Portable

Diamond Cut Forensics10 Audio Laboratory 10.50 Portable
Diamond Cut Forensics10 Audio Laboratory 10.50 Portable | 50 Mb
DCForensics10 Audio Laboratory Unlocking the Mysteries of Forensics Audio Files Surveillance Audio Recording Forensics Audio.

Download Now

Wireshark Malware and Forensics


Wireshark  Malware and Forensics
Wireshark: Malware and Forensics
MP4 | Video: AVC 1280x720 | Audio: AAC 48KHz 2ch | Duration: 2 Hours | 301 MB
Genre: eLearning | Language: English


Download Now

Surviving Digital Forensics RAM Extraction Fundamentals (1)


Surviving Digital Forensics RAM Extraction Fundamentals (1)

Surviving Digital Forensics RAM Extraction Fundamentals (1)
English | Size: 205.03 MB
Category: CBTs
Conducting a RAM extraction as part of the computer evidence collection process is a front line examiner skill which becoming more and more in demand. A system's live memory contains an assortment of valuable forensic data. A computer analyst trained in memory forensics can dig out evidence of hidden malware processes, user activity and encryption keys or password hashes that may be critical to accesses protected data.

This class provides you with the foundation knowledge to help you make better decisions about why or why not to capture live memory. It also gives you hands on experience using a number of freely available RAM capture tools and covers the advanced topic of using Inception.

Learn why RAM extractions are important and how the data can affect your case.
Practical exercises give you hands on experience with different RAM extraction tools.
Learn how to evaluate and benchmark your RAM capture tools.
Learn how to use PALADIN to launch INCEPTION to gain access to password protected systems in order to extract RAM.
Learn all of this in about one hour using all freely available tools.

Download Now

SANS 585 Advanced Smartphone Forensics (2017) MP3


SANS 585 Advanced Smartphone Forensics (2017) MP3

SANS 585: Advanced Smartphone Forensics (2017) MP3
English | Size: 1.96 GB
Category: CBTs
Mobile devices are often a key factor in criminal cases, intrusions, IP theft, security threats, accident reconstruction, and more. Understanding how to leverage the data from the device in a correct manner can make or break your case and your future as an expert.

Download Now

Packt - Digital Forensics for Cyber Professionals

Packt - Digital Forensics for Cyber Professionals

Packt - Digital Forensics for Cyber Professionals
English | Size: 1.24 GB
Category: Tutorial
In this course you will learn how to use open source tools to collect digital forensic information from Linux and ShiChuang systems. You will learn how to conduct static malware analysis of live 'Ransomware' using forensics tools and techniques.This course focuses on screencast demonstrations of how to use these tools in a step-by-step manner so you can start doing forensics work immediately on your own.
Download Now

Windows Security & Forensics

Windows Security & Forensics
ShiChuang Security & Forensics
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 5 Hours | 7.28 GB
Genre: eLearning | Language: English

Every organization must prepare for the possibility of cybercrime within its networks or on its computer systems. Are you able to investigate crimes, like fraud, insider threats, industrial espionage, employee misuse, and computer intrusion? These days, every IT Pro should learn to recover key intelligence from ShiChuang systems.

Download Now

Open Source Software for Digital Forensics


Open Source Software for Digital Forensics

Ewa Huebner, Stefano Zanero, "Open Source Software for Digital Forensics"
2010 | pages: 123 | ISBN: 1441958029 | PDF | 3,7 mb

Download Now