Forensic Analysis: Cybercrime Investigations

Cybersecurity    |    Intermediate
  • 17 videos | 1h 37m 19s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 41 users Rating 4.7 of 41 users (41)
Cybercrime investigators are typically responsible for collecting, processing, analyzing, and interpreting digital evidence related to network vulnerabilities, criminal activity, and counterintelligence initiatives. In this course, you'll explore the basics of network packet capturing, a process used to intercept and log traffic occurring over a network. You'll also examine the purpose and features of some standard tools and techniques to preserve and analyze a computer system's most volatile data. You'll then learn to use some of these tools and techniques to achieve various digital forensic analysis goals. Next, you'll recognize computer forensic best practices, including locating evidence in the Windows Registry. Finally, you'll learn how to differentiate between the purpose and features of the various tools available for conducting hard disk forensic analysis.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Define packet capturing and outline how it relates to cyberops forensics
    Define network forensics and describe some types of vulnerabilities
    Demonstrate the use of packet capturing to gain intelligence from an attack
    Illustrate how to reconstruct artifacts and files from a pcap file using wireshark
    Define volatile data and identify the possible data contained within
    Compare available tools used to analyze a computer's memory
    Demonstrate how to use the volatility framework to process extraction of computer memory
    Describe the windows registry and recognize the valuable information stored within
  • Navigate the windows registry and use it to locate changes made a to system
    Differentiate between windows registry tools and the techniques used for analyzing changes to the registry
    Differentiate between categories of digital evidence, including computer, mobile, network, and database
    Outline how to gather digital evidence, including identification, collection, acquisition, and preservation
    Identify tools available for computer forensic analysis and their features
    Describe the features of the sift computer forensics tool
    Illustrate how to mount evidence using sift
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 36s
  • 5m 58s
    In this video, you will define packet capturing and outline how it relates to CyberOps forensics. FREE ACCESS
  • Locked
    3.  Network Forensics
    6m 1s
    Learn about network forensics and describe some types of vulnerabilities FREE ACCESS
  • Locked
    4.  Capturing Network Traffic
    8m 15s
    Learn about the use of packet capturing to gain intelligence from an attack. FREE ACCESS
  • Locked
    5.  Working With PCAP Files
    9m 9s
    Upon completion of this video, you will be able to illustrate how to reconstruct artifacts and files from a PCAP file using Wireshark. FREE ACCESS
  • Locked
    6.  Volatile Data
    6m 52s
    During this video, you will learn how to define volatile data and identify the possible data types that can be volatile. FREE ACCESS
  • Locked
    7.  Memory Forensics Tools
    6m 40s
    Find out how to compare available tools used to analyze a computer's memory. FREE ACCESS
  • Locked
    8.  Using the Volatility Framework
    13m 22s
    In this video, you will learn how to use the volatility framework to extract computer memory. FREE ACCESS
  • Locked
    9.  Windows Registry
    4m 14s
    Upon completion of this video, you will be able to describe the Windows Registry and recognize the valuable information stored within it. FREE ACCESS
  • Locked
    10.  Locating Evidence Within the Registry
    11m 40s
    In this video, you will learn how to navigate the Windows Registry and use it to locate changes made to the system. FREE ACCESS
  • Locked
    11.  Registry Analysis Tools
    2m 31s
    Learn how to differentiate between Windows Registry tools and the techniques used for analyzing changes to the registry. FREE ACCESS
  • Locked
    12.  Categories of Digital Evidence
    5m 22s
    In this video, you will learn how to differentiate between categories of digital evidence, including computers, mobile devices, networks, and databases. FREE ACCESS
  • Locked
    13.  Gathering Digital Evidence
    3m 23s
    In this video, you will outline how to gather digital evidence, including identification, collection, acquisition, and preservation. FREE ACCESS
  • Locked
    14.  Computer Forensic Analysis Tools
    3m 17s
    In this video, find out how to identify tools available for computer forensic analysis and what their features are. FREE ACCESS
  • Locked
    15.  SANS Investigative Forensic Toolkit (SIFT)
    2m 16s
    After completing this video, you will be able to describe the features of the SIFT computer forensics tool. FREE ACCESS
  • Locked
    16.  Analyzing Evidence Using SIFT
    5m 30s
    Upon completion of this video, you will be able to illustrate how to mount evidence using the SIFT program. FREE ACCESS
  • Locked
    17.  Course Summary
    1m 14s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 4.6 of 51 users Rating 4.6 of 51 users (51)
Rating 4.5 of 12 users Rating 4.5 of 12 users (12)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.1 of 39 users Rating 4.1 of 39 users (39)
Rating 4.4 of 188 users Rating 4.4 of 188 users (188)
Rating 4.4 of 91 users Rating 4.4 of 91 users (91)