Computer and Hacking Forensics Notes

Steganography

Welcome to Module 13 of the Computer Hacking and Forensics course, Steganography. This Steganography module introduces you to digital media and hiding messages (“stegoed”) within a variety of different media or any object. You’ll learn what a [view]

By: jgalarza2 | Related Lesson: | Modified: November 6, 2017

forensic image files

This module is a basic discussion and overview of forensic image files. From this module, you’ll learn everything you (Gif, jpg, tiff, bmp, jp2, png, zip) could ever possibly wanted learn about images. For example, you’ll learn why some images re [view]

By: jgalarza2 | Related Lesson: | Modified: November 6, 2017

Access Data FTK Graphics Overview Lab

This lab discuss in depth the benefits of using graphics tabs within the Access Data FTK, as well as how to use and identify the graphics images, change file extensions when needed. The graphics tools for the FTK deals with layers 6 and 7 of the OSI [view]

By: jgalarza2 | Related Lesson: | Modified: November 6, 2017

Access Data FTK tools

This lab explores and discuss the basics of the Tools Menu, and why an intimate understanding and knowledge of the of the Access Data FTK tools menu is critical. For example, you’ll learn where you utilize file encryption, import hash, detect known [view]

By: jgalarza2 | Related Lesson: | Modified: November 6, 2017

Access Data FTK

This lab provides a demonstration on how to tie everything together, it’s the Report Lab for of the Access Data FTK module. You’ll learn how to launch and use the report wizard, what components you should include, how to use certain wizard featur [view]

By: jgalarza2 | Related Lesson: | Modified: November 6, 2017

Access Data FTK

Our first lab of the Access Data FTK module is a basic introduction to the Access Data File Tool Kit. We’ll discuss and review examples of basics for exams you may take on the Access Data FTK using sample course materials. Topics reviewed as essent [view]

By: jgalarza2 | Related Lesson: | Modified: November 6, 2017

Access Data File Tool Kit (FTK)

Welcome to Module 11 of the Computer Hacking and Forensics course, Access Data. This module introduces the Access Data File Tool Kit (FTK). This lab discusses in detail the Access Data File Tool Kit (FTK), in terms of its setup, how to install, the v [view]

By: jgalarza2 | Related Lesson: | Modified: November 6, 2017

WinUndelete

For our final lab in the Deleting and Recovering Deleted Files series, you’ll explore WinUndelete. The WinUndelete tool is an easy to use Windows utility for recovering files. You’ll observe the creation of several files, different in size, see t [view]

By: jgalarza2 | Related Lesson: | Modified: November 6, 2017

Welcome to the Total Recall lab

Welcome to the Total Recall lab. In this lab we continue with file recovery tools demonstration by scanning a USB drive. Total Recall is a very thorough, time consuming scanning tool. You’ll learn from observing it the myriad information it provide [view]

By: jgalarza2 | Related Lesson: | Modified: November 6, 2017

Access DATA

FAT ( Insa  Navigation (Web, filter, Hex, ) Using FTK (Ceart a case, Evidence option, Data carving, Dec) [view]

By: ALI | Related Lesson: | Modified: November 6, 2017

« First ‹ Previous 1 86 94 95 96 97 98 106 196 401 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel