4.1 Course Summary

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
37 minutes
Difficulty
Beginner
CEU/CPE
1
Video Transcription
00:00
All right, Welcome to basic elementary, dead boot forensic acquisition. And let's get right into this.
00:07
Everything we have together discuss today we went through how to create an elementary dead boot USB dongle.
00:14
Ah, we use that dead boot on a target computer for a never met tree acquisition. We used the license dongle attached locally to that's machine to create a local acquisition that we can do right there from the target system with no controller involved. And then we use the,
00:32
uh, every metric controller to manage across the wire network our forensic
00:37
collection Pretty easy, pretty quick. And ah,
00:42
no real fuss. Or must there?
00:44
As always, there'll be a course next week. We're doing wireless, same thing, and, uh, get your forensic stuff together come running with us.