Forensic Analysis: Cybercrime Investigations
Cybersecurity
| Intermediate
- 17 videos | 1h 37m 19s
- Includes Assessment
- Earns a Badge
Cybercrime investigators are typically responsible for collecting, processing, analyzing, and interpreting digital evidence related to network vulnerabilities, criminal activity, and counterintelligence initiatives. In this course, you'll explore the basics of network packet capturing, a process used to intercept and log traffic occurring over a network. You'll also examine the purpose and features of some standard tools and techniques to preserve and analyze a computer system's most volatile data. You'll then learn to use some of these tools and techniques to achieve various digital forensic analysis goals. Next, you'll recognize computer forensic best practices, including locating evidence in the Windows Registry. Finally, you'll learn how to differentiate between the purpose and features of the various tools available for conducting hard disk forensic analysis.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDefine packet capturing and outline how it relates to cyberops forensicsDefine network forensics and describe some types of vulnerabilitiesDemonstrate the use of packet capturing to gain intelligence from an attackIllustrate how to reconstruct artifacts and files from a pcap file using wiresharkDefine volatile data and identify the possible data contained withinCompare available tools used to analyze a computer's memoryDemonstrate how to use the volatility framework to process extraction of computer memoryDescribe the windows registry and recognize the valuable information stored within
-
Navigate the windows registry and use it to locate changes made a to systemDifferentiate between windows registry tools and the techniques used for analyzing changes to the registryDifferentiate between categories of digital evidence, including computer, mobile, network, and databaseOutline how to gather digital evidence, including identification, collection, acquisition, and preservationIdentify tools available for computer forensic analysis and their featuresDescribe the features of the sift computer forensics toolIllustrate how to mount evidence using siftSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 36s
-
5m 58sIn this video, you will define packet capturing and outline how it relates to CyberOps forensics. FREE ACCESS
-
6m 1sLearn about network forensics and describe some types of vulnerabilities FREE ACCESS
-
8m 15sLearn about the use of packet capturing to gain intelligence from an attack. FREE ACCESS
-
9m 9sUpon completion of this video, you will be able to illustrate how to reconstruct artifacts and files from a PCAP file using Wireshark. FREE ACCESS
-
6m 52sDuring this video, you will learn how to define volatile data and identify the possible data types that can be volatile. FREE ACCESS
-
6m 40sFind out how to compare available tools used to analyze a computer's memory. FREE ACCESS
-
13m 22sIn this video, you will learn how to use the volatility framework to extract computer memory. FREE ACCESS
-
4m 14sUpon completion of this video, you will be able to describe the Windows Registry and recognize the valuable information stored within it. FREE ACCESS
-
11m 40sIn this video, you will learn how to navigate the Windows Registry and use it to locate changes made to the system. FREE ACCESS
-
2m 31sLearn how to differentiate between Windows Registry tools and the techniques used for analyzing changes to the registry. FREE ACCESS
-
5m 22sIn this video, you will learn how to differentiate between categories of digital evidence, including computers, mobile devices, networks, and databases. FREE ACCESS
-
3m 23sIn this video, you will outline how to gather digital evidence, including identification, collection, acquisition, and preservation. FREE ACCESS
-
3m 17sIn this video, find out how to identify tools available for computer forensic analysis and what their features are. FREE ACCESS
-
2m 16sAfter completing this video, you will be able to describe the features of the SIFT computer forensics tool. FREE ACCESS
-
5m 30sUpon completion of this video, you will be able to illustrate how to mount evidence using the SIFT program. FREE ACCESS
-
1m 14s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.