Join Jungwoo Ryoo for an in-depth discussion in this video Next steps, part of Learning Computer Forensics.
…Thanks for watching this course.…I hope you really enjoyed it.…If your interested in taking your skills a step further check out…these courses on lynda.com.…One of the courses I recommend is Foundations of…Programming Web Security with Kevin Skoglund.…Network security is a newly emerging field of computer forensics.…In this course, we'll give you very good exposure to network security.…Another course I recommend is up and…running with Ubuntu Desktop Linux, with Scott Simpson.…
As you saw in my video there's a lot of need for computer forensics specialists.…To know more about Linux operating systems.…Many tools you use as a computer forensics specialist, are Linux based.…Finally I recommend, Python 3 Essential Training with Bill Weinman.…Many of the computer forensics tools allow you to write scripts to automate some of…the mundane computer forensics tasks.…Knowing a language like Python will help you a lot as a computer…forensics specialist.…Now, thank you again, and see you next time.…
Author
Released
8/20/2014- Understanding computer forensics
- Understanding partitioning
- Using a hex editor
- Preparing a target drive
- Acquiring data
- Ensuring data integrity with hashing
- Indexing and searching
- Generating a report
Skill Level Intermediate
Duration
Views
Q: Which operating systems support built-in write blocking?
Q: Are there other ways to access deleted files in the usbimage.001 file?
Related Courses
-
Small Office Networking to Connect, Share, and Print
with Garrick Chow3h 23m Appropriate for all -
Heartbleed Tactics for Small IT Shops
with David Gassner16m 39s Beginner
-
Introduction
-
Welcome59s
-
-
1. Understanding Computer Forensics
-
Goals of computer forensics1m 21s
-
Computer forensics tools2m 27s
-
Legal implications2m 25s
-
-
2. Preparing for a Computer Forensics Investigation
-
Computer forensics hardware2m 46s
-
Computer forensics software1m 31s
-
Understanding partitioning2m 18s
-
Using a hex editor3m 39s
-
Understanding an offset2m 14s
-
-
3. Preserving Data
-
Hashing algorithms1m 42s
-
Understanding mounting3m 56s
-
Mounting manually3m 54s
-
4. Acquiring Data
-
Live acquisition30s
-
Remote acquisition1m 10s
-
5. Analyzing Data
-
Indexing1m 54s
-
Searching3m 57s
-
Generating a report3m 40s
-
Understanding disk drives2m 31s
-
-
Conclusion
-
Next steps1m 1s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Next steps