System Security Certified Practitioner (SSCP 2018): Digital Forensics

Intermediate
  • 13 videos | 46m 58s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 6 users Rating 4.7 of 6 users (6)
This course explores key aspects of digital forensics by looking at device usage while helping prepare learners for the Systems Security Certified Practitioner (SSCP) certification exam. In 13 videos, you will examine evidence gathering, chain of custody, data recovery, hard drive scrubbing, IP address tracking, and memory forensics. You will learn that a crucial aspect of digital forensics is the gathering of evidence in a lawful manner. Next, learners will examine how to determine when events occurred, when files were modified, when certain websites were accessed, and when messages were received. You will examine the chain of custody for preservation of evidence, and having a detailed account of gathering and handling evidence. This course demonstrates how to recover deleted data, and how to use a steganography tool to hide data in plain sight. You will examine memory forensics, a subset of digital forensics. This course then discusses the NIST (National Institute of Standards and Technologies) document publication 800-86. Finally, learn how to create a raw image of a hard disk drive.

WHAT YOU WILL LEARN

  • List steps taken by digital forensic investigators
    Describe the order of volatility and preservation of scene
    Describe how evidence must be gathered and preserved for legal admissibility
    Recover deleted data
    Extract insights from stored web browser data
    Use software to permanently remove hard disk data
  • Describe how vpns and proxies are used to hide network identities
    Use tools to track the origin of an ip address
    Uncover hidden data using a steganography tool
    Describe insights that can be gathered from memory dumps
    Use the linux dd command to create a disk image
    Use common tools to gather digital evidence

IN THIS COURSE

  • 1m 58s
  • 3m 33s
    Upon completion of this video, you will be able to list the steps taken by digital forensic investigators. FREE ACCESS
  • Locked
    3.  Evidence Gathering
    4m 47s
    Upon completion of this video, you will be able to describe the order of volatility and preservation of a scene. FREE ACCESS
  • Locked
    4.  Chain of Custody
    3m 51s
    After completing this video, you will be able to describe how evidence must be gathered and preserved to be admissible in a legal setting. FREE ACCESS
  • Locked
    5.  Data Recovery
    3m 47s
    In this video, you will learn how to recover deleted data. FREE ACCESS
  • Locked
    6.  Web Browser Data
    6m 11s
    In this video, you will extract insights from stored web browser data. FREE ACCESS
  • Locked
    7.  Hard Drive Scrubbing
    2m 6s
    In this video, learn how to use software to permanently delete hard disk data. FREE ACCESS
  • Locked
    8.  VPNs and Proxy Anonymizers
    2m 27s
    After completing this video, you will be able to describe how VPNs and proxies are used to conceal network identities. FREE ACCESS
  • Locked
    9.  IP Address Tracking
    4m 39s
    To find out how to use tools to track the origin of an IP address, consult a search engine. FREE ACCESS
  • Locked
    10.  View Hidden Data
    3m 40s
    In this video, find out how to uncover hidden data using a steganography tool. FREE ACCESS
  • Locked
    11.  Memory Forensics
    3m 55s
    Upon completion of this video, you will be able to describe insights that can be gathered from memory dumps. FREE ACCESS
  • Locked
    12.  Create a Raw Image of a Hard Disk Drive
    2m 45s
    During this video, you will learn how to use the Linux dd command to create an image of a disk. FREE ACCESS
  • Locked
    13.  Exercise: Gather Digital Evidence
    3m 17s
    In this video, you will learn how to use common tools to collect digital evidence. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 48 users Rating 4.6 of 48 users (48)
Rating 4.2 of 26 users Rating 4.2 of 26 users (26)
Rating 4.4 of 188 users Rating 4.4 of 188 users (188)