Digital Forensics and Cyber Crime with Kali Linux Fundamentals

Pearson presents Digital Forensics and Cyber Crime with Kali Linux Fundamentals.

Digital Forensics and Cyber Crime with Kali Linux Fundamentals

Course Description

Why is digital forensics so important? In today’s digital world, every organization is bound to be attacked and likely breached by a cyber adversary. Forensics can be used to determine if and how a breach occurred and also how to properly respond. Digital Forensics and Cyber Crime with Kali Linux Fundamentals LiveLessons from Pearson introduces you to the world of digital forensics and acts as a primer for your future forensic work. This is a fundamentals course with a focus on the average network engineer, so you don’t need to be an IT expert to follow most of the concepts. Learn when a breach occurs, what actions you can take, and how to learn from the breach to prevent future attacks. This video course focuses on using open source technology available in the Kali Linux framework along with other tools to simplify forensic... Read More »

Why is digital forensics so important? In today’s digital world, every organization is bound to be attacked and likely breached by a cyber adversary. Forensics can be used to determine if and how a breach occurred and also how to properly respond.

Digital Forensics and Cyber Crime with Kali Linux Fundamentals LiveLessons from Pearson introduces you to the world of digital forensics and acts as a primer for your future forensic work. This is a fundamentals course with a focus on the average network engineer, so you don’t need to be an IT expert to follow most of the concepts. Learn when a breach occurs, what actions you can take, and how to learn from the breach to prevent future attacks. This video course focuses on using open source technology available in the Kali Linux framework along with other tools to simplify forensic tasks. You will master the basics of digital forensics, learn best practices, and explore legal and forensic service concepts.

You will learn how to:

  • Plan, organize, build, and deploy end-to-end IoT solutions
  • Navigate today’s IoT product marketplace
  • Use maturing IoT technologies to solve many business and technical problems
  • Make sense of the full IoT protocol stack, from 802.15.4 and LPWA to IPv6 adaptations and management
  • Architect IoT networks for maximum security and integrity
  • Generate meaningful intelligence from the data your smart objects capture
  • Compare and use batch-level and real-time streaming analytics
  • Improve IoT system efficiency through fog and edge computing
  • Leverage key IoT applications for utilities, transportation, manufacturing, smart cities, public safety, oil/gas production, and mining
Read Less
Course Details:

Target Audience

  • Any network or security professional who is concerned about being breached by cyber threats. This includes people looking to develop an incident response plan, anyone with an interest in digital forensics.
  • Network Engineers looking to beef up their security knowledge, and people involved with cyber security work.

Prerequisites

  • In order to take this course, you need to have a basic knowledge of the Internet and networking technology.
Certificate Info:

Type of Certification

Certificate of Completion

Format of Certification

Digital and Print

Professional Association/Affiliation

This certificate is issued by Pearson LearnIT

Method of Obtaining Certification

Upon successful completion of the course, participants will receive a certificate of completion.

Course Outline

  • Digital Forensics and Cyber Crime with Kali Linux Fundamentals: Introduction
  • Learning objectives
  • Why forensics
  • Cyber crime
  • Introduction to digital forensics
  • Summary
  • Learning objectives
  • 2.1 Overview of digital forensics
  • 2.2 Outsourcing vs. providing in-house forensic services
  • 2.3 Search and seizure overview
  • 2.4 Basic Forensics lab
  • 2.5 Forensic tool overview
  • 2.6 Collecting evidence
  • 2.7 Steganography and images
  • 2.8 Preserving and reviewing digital evidence
  • 2.9 Packaging evidence
  • 2.10 Forensic reports
  • Summary
  • Learning objectives
  • 3.1 Downloading Kali Linux
  • 3.2 Creating and running Kali Linux
  • 3.3 Running Kali Linux Virtual Machine
  • 3.4 Updating and installing Forensic Packages
  • 3.5 Kali Linux as a Forensic Workstation
  • Summary
  • Learning objectives
  • 4.1 Pre Duplication
  • 4.2 Forensic Images
  • 4.3 Images Types
  • 4.4 RAID
  • 4.5 Kali Disk Duplication
  • 4.6 Windows Disk Duplication
  • Summary
  • Learning objectives
  • 5.1 Introduction to Collecting and Preserving
  • 5.2 Hashing
  • 5.3 Preserving Data
  • 5.4 Linux Tools
  • Learning objectives
  • 6.1 Password cracking concepts
  • 6.2 Passwords cracking tools
  • 6.3 WIndows Passwords
  • 6.4 Linux / OSX passwords
  • Summary
  • Learning objectives
  • 7.1 File system overview
  • 7.2 Shortcut files
  • 7.3 Recycle bin
  • 7.4 Infor and spool files
  • 7.5 Registry Part 1
  • 7.6 Registry Part 2
  • 7.7 Registry by OS
  • 7.8 Registry Part 3
  • 7.9 Registry Forensics
  • 7.10 Registry investigations
  • 7.11 FTK registry viewer
  • Summary
  • Learning objectives
  • 8.1 Networks
  • 8.2 Security Tools
  • 8.3 Firewalls
  • 8.4 Content Filtering
  • 8.5 Breach and Honeypots
  • 8.6 Network Access Control
  • 8.7 Netflow
  • 8.8 Data Loss Prevention
  • 8.9 Network Attacks
  • 8.10 Detecting Threats
  • 8.11 Snort Part 1
  • 8.12 Snort Part 2
  • 8.13 Network Logs
  • Summary
  • Learning objectives
  • 9.1 Email systems and clients
  • 9.2 Investigating Email
  • 9.3 Email forensic tools
  • Summary
  • Learning objectives
  • 10.1 Introduction to malware analysis
  • 10.2 Static analysis
  • 10.3 Static analysis tools
  • 10.4 Static analysis PDF
  • 10.5 Dynamic analysis
  • Summary
  • 11.1 Investigating a laptop for HR
  • 11.2 Investigating a network breach
  • 11.3 Investigating a hard drive from eBay
  • 11.4 Complete legal example
  • Summary
  • Digital Forensics and Cyber Crime with Kali Linux Fundamentals

DON'T HAVE TIME?

We can send you everything you need to know about this course through email.
We respect your privacy. Your information is safe and will never be shared.