Digital Forensics for Penetration Testers Online Course
Digital Forensics for Penetration Testers Online Course
This course provides a foundational introduction to digital forensics, designed for pentesters and cybersecurity professionals who want to expand their expertise. You’ll learn the essential concepts of detecting, analyzing, and tracing cybercriminal activities, while understanding how digital forensics differs from general computer security. By the end, you’ll gain practical insights into applying forensic techniques, not just observing them, making this an excellent primer for anyone considering a career in digital forensics.
Who should take this Course?
The Digital Forensics for Penetration Testers Online Course is ideal for penetration testers, ethical hackers, and cybersecurity professionals who want to strengthen their skills in investigating, analyzing, and preserving digital evidence. It is also valuable for students, SOC analysts, and IT security practitioners seeking hands-on experience in combining offensive security techniques with forensic practices to better understand, detect, and respond to cyber incidents.
What you will learn
- Learn how to forensically image devices
- Learn how to recover deleted data from various operating systems
- Learn how to produce professional and legal digital forensic reports
- Learn how to properly handle digital media before and during investigations
- Learn how to utilize various forensic tools for digital forensic investigations
- Learn how to analyze and reverse engineer software and malware
Course Outline
Course Overview
Building Your Forensics Lab Environment Using VirtualBox
- Downloading ISO and OVA File for VirtualBox
- Create a Virtual Install of CSI Linux 2021.2
- Create a Kali Live (Forensic Mode) VM Using VirtualBox
- Create a Virtual Install Kali Image Using VirtualBox
- Create Virtual Install of Windows 10 Using VirtualBox
- Create Virtual Install of Metasploitable2 Using VirtualBox
Using Kali Forensic Mode and Autopsy
- Video and Lab -Getting Started with Autopsy
- Video and Lab - Simulate Creating a Disk Image for a Forensic Analysis
- Video and Lab - Examining a Forensic Disk Image Using Autopsy
Digital Forensics Case Management
- Video and Lab - Installing the WebMap-Nmap Dashboard
Open-Source Intelligence (OSINT)
- Video and Lab - Conducting OSINT Using CSI Linux Investigator
- Video and Lab - Find Social Media Accounts Using Sherlock
- Video - OSINT Framework - Overview
Using Shodan to Search for Vulnerable Devices
- Video and Lab - Preparing CSI Investigator to Use Shodan
- Video and Lab - Using Shodan to Find Vulnerable Devices
- Video and lab - Using Shodan to Search for Vulnerable Databases
Computer Forensics
- Video - Attaching an External USB Device in Kali
- Video and Lab – Acquiring a Forensic Copy of the Windows Registry
- Video and Lab – Analyzing the Windows Registry for Evidence
- Video and Lab - Dumping Wi-Fi Credentials Using netsh
- Video and Lab - Email Header Analysis
- Video and Lab - Using Shellbags to View Hidden or Deleted Folders
- Video and Lab - Extracting Thumbnail Images From a Suspect's Machine
- Video and lab - Memory Forensics Using the Volatility Framework
Reverse Engineering and Malware Analysis
- Video and Lab - Install Ghidra on CSI Linux
- Video and Lab - Introduction to Using Ghidra
- Video and Lab - Reverse Engineering crackme0x00 Using Ghidra
- Video and Lab - Reverse Engineering crackme0x05 Using Ghidra
- Video and Lab - Analyzing the WannaCry Killswitch Using Ghidra
Stenography
- Video and Lab - Using Steghide to Hide and Extract Data
- Video and Lab - Using the EXIFtool to Read and Write EXIF Tags
Network Forensics Using Wireshark
- Video - Overview of Wireshark 3.2
- Video - Wireshark Capture Options
- Video - Wireshark Toolbar Icons
- Video and Lab - Installing a Wireless Adapter in Kali
- Video and Lab - Hacking a Wireless Network Using Kali Linux
- Video - Capturing Wireless Traffic Using Wireshark
- Video and Lab - Capturing a 3-way TCP Handshake Using Wireshark
Practice What You learned
- Video and Lab - CTF Lab Build for HA: Forensics
- Video and lab - Capture flag #1
- Video and lab - Capture flag #2
- Video and lab - Capture flag #3
- Video and lab - Capture flag #4
No reviews yet. Be the first to review!