Let's Explore How to Strengthen Cybersecurity Practices
With over 23 years of experience in the IT industry, he is a skilled cybersecurity professional with a diverse set of certifications including C|OSINT, CEH v8 - v12, CISP, Metasploit, ACE, and more. As an online instructor, he is passionate about sharing his expertise in OSINT, ethical hacking, and network security. He has contracted courses for reputable organizations like EC-Council and Udemy, and his articles have been featured in leading publications such as Hakin9 and eForensics magazine.
Implementing GRC Best Practices for Enhanced Governance and Risk Management
In today's rapidly evolving business landscape, organizations face numerous challenges related to governance, risk management, and compliance (GRC). Failure to effectively address these challenges can lead to significant financial losses, damage to reputation, and legal and regulatory consequences. To mitigate these risks, organizations are increasingly adopting GRC best practices to establish a robust framework for governance, risk management, and compliance. This blog post explores the importance of GRC, its key components, and provides insights into implementing GRC best practices for enhanced organizational performance.
Digital Forensics in Docker Environments: Challenges and Solutions
Digital forensics plays a critical role in investigating and analyzing cyber incidents. As Docker continues to gain popularity as a containerization technology, it brings forth unique challenges for digital forensics practitioners. We are here to help you understand the challenges faced when conducting digital forensics in Docker environments and how you can find potential solutions to overcome them. By understanding these challenges and implementing appropriate solutions, forensic investigators can effectively analyze Docker containers and preserve crucial evidence.
Exploring the World of Digital Forensics in 2023
Digital forensics refers to the process of uncovering, analyzing, and preserving electronic evidence to support investigations and legal proceedings. Digital forensics is the application of scientific techniques and methodologies to investigate digital devices and networks, aiming to extract, analyze, and interpret electronic evidence. It involves the collection, preservation, examination, and presentation of digital data in a manner that maintains its integrity and admissibility in legal proceedings.

Windows Registry extraction with FTK Imager [FREE COURSE CONTENT]
There are several ways to perform an extraction from the Windows Registry, let’s see some of the most useful. This …
Forensic Investigation of Storage Media
Tools and Procedures for Forensic Investigation of Storage Media Deivison Franco, Cleber Soares, Daniel Müller, and Joas Santos Digital data and …
CyberChef Walkthrough [FREE COURSE CONTENT]
In this short tutorial by Cordny Nederkoorn, the instructor of our MacOS Anti-Forensics course, you will learn how to use CyberChef …
Instagram Forensics | iOS Social Media Forensics [FREE COURSE CONTENT]
In this video tutorial, you will go through an introduction to Instagram Forensics - what it is, what it is …
What is a Sock Puppet Account And Why Do We Need One?
When it comes to OSINT investigations, surveillance, and other searches, the use of a sock puppet account(s) is a critical …
Forensically Sound Imaging | Digital Forensic Imaging - Tools & Methods [FREE COURSE CONTENT]
In this short video from our Digital Forensic Imaging online course we take a deep dive into Forensically Sound Imaging …
Wireshark | Log Files: Attacks & Defenses [FREE COURSE CONTENT]
In this video tutorial, you will hear about the Wireshark tool. It is a part of our online course 'Log …
Forensic Science Challenges: Cloud Architecture | Cloud Forensics [FREE COURSE CONTENT]
In this video tutorial, you will go through the topic of Cloud architecture. It is a part of our online …
Kernel Self-Protection and Its Methods | Linux Kernel Security [FREE COURSE CONTENT]
In this video tutorial, you will go through an introduction to kernel self-protection and its methods. It is a part …
Hunt Interface | Network Monitoring with Security Onion [FREE COURSE CONTENT]
In this video tutorial, you will go through an introduction to Hunt Interface. It is a part of our online …
Android Incident Response | Android Mobile Forensics [FREE COURSE CONTENT]
This video tutorial will teach you about Android incident response. It is a part of our online course 'Android Mobile …
Nessus: scanning for vulnerabilities [FREE COURSE CONTENT]
In this video from our Exploitation with Armitage online course your instructor and our long-time collaborator, Paul Janes, goes through …
Detecting Fake Images via Noise Analysis | Forensics Tutorial [FREE COURSE CONTENT]
In this video from our Digital Image Forensics course you will see how PRNU and SPN can be used to …
Assembly for reverse engineering - basic programming [FREE COURSE CONTENT]
In this short video from our Software Reverse Engineering course we will learn how to write a simple program in …
Forensic cases suited for using PowerShell | PowerShell in Digital Forensics [FREE COURSE CONTENT]
This video tutorial shows forensic cases suited for using PowerShell. It is a part of our online course 'PowerShell in …
How Technological Advancements in Forensic Technologies are Shaping Future of Crime Investigations
Increase in the incidences of crime across the globe has posed concerns across the globe. In the statistics presented by …
YARA tutorial: detecting malicious documents [FREE COURSE CONTENT]
In this video from our Analyzing Malicious Documents course we learn how to set up YARA to detect malicious documents. …
Introduction | Investigate Cyber Fraud - Real-Life Cases [FREE COURSE CONTENT]
In this video tutorial, you will see the introduction to investigating cyber fraud! It is a part of our …
Photographic Evidence and Photographic Evidence Tampering
The following is just an introduction to an advanced forensics course focusing on photographic evidence. If you want to learn …
Encrypted file system forensics - Introduction (EXT4) [FREE COURSE CONTENT]
In this video from our EXT4 File System Forensics by Divya Lakshmanan you will get a quick intro to dealing …
The Human Element: an Analysis of the Relationships Between Social Engineering and Ransomware Attacks
To understand how the human element is exploited, this article aims to present an overview of ransomware and social engineering, discussing their relationship and focusing on how the human factor can be used as an agent to exploit becoming an attack vector.
Hunting for macOS Ransomware Using VirusTotal Enterprise
ARRR-Ransomware for macOS be-out there ‘laddies’, and we are going to find it! Join me as we embark on a wild adventure to sail the deepest and darkest seas on the hunt for macOS ransomware. BONUS: We’ve added a surprise for the latest ransomware for macOS, which occurred during the preliminary writing of this article.
Sensory-based Deception Attacks to thwart Drone Forensic Investigations
In this article, sensory-based deception attacks that hinder drone forensic investigations will be discussed. Sensory-based deception attacks on drones are attacks that manipulate a drone's behavior by feeding deceptive sensory information. Sensory-based deception attacks can pose a severe challenge for drone forensic investigations.
Safeguarding Remote Video Identification: A Look at Drone Cybersecurity
Unmanned aerial vehicles (UAVs), commonly known as drones, have revolutionized various industries, and one of their critical applications is remote video identification. This technology enables real-time monitoring of distant locations, providing invaluable assistance in fields such as law enforcement, disaster response, and infrastructure inspection. However, as the use of drones for remote video identification grows, the importance of drone cybersecurity becomes increasingly paramount. We examine drone cybersecurity in the context of remote video identification in this article, supported by recent news items and statistics.

Deepfake Audio: A Comprehensive Study in Digital Forensics Course Online (W62)
Enter a short description of the course.
PRESALE: Micro-drone Warfare: Cybersecurity Implications and Countermeasures (W61)
"Micro-drone Warfare: Cybersecurity Implications and Countermeasures" is an advanced course designed for digital forensics professionals seeking to understand the cybersecurity challenges posed by the increasing use of micro-drones in modern warfare. The course provides an in-depth exploration of micro-drone technologies, their role in cyber threats, and the countermeasures necessary to mitigate these threats. Learners will delve into the various types and capabilities of micro-drones, their communication and networking technologies, and the associated cybersecurity vulnerabilities. The course covers risk assessment and threat modeling for micro-drone systems, analysis of real-world micro-drone warfare scenarios, and the development of defense strategies against potential cyber attacks. Additionally, the course addresses the legal and policy frameworks governing micro-drone warfare cybersecurity, including ethical considerations, privacy implications, and international regulations. The course is led by Rhonda Johnson, a seasoned educator and Ph.D. student specializing in Cybersecurity. Prior knowledge of computer networks, cybersecurity principles, operating systems, basic electronics, and wireless communication is recommended. The course employs tools such as Drone Simulators and Drone Performance Evaluation Tools for practical learning.
Data Integrity And Evidence Handling in Digital Forensics - Course Online (W60)
The course is intended for individuals from the IT industry as well as those outside of it who have some knowledge of cybersecurity. Basic concepts of cybersecurity are required. During the course, participants will acquire skills related to: Understanding digital forensics, including its scope, relevance in investigations, and legal and ethical considerations. Concepts of data integrity and its significance in digital forensics. They will learn about various threats to data integrity and techniques for ensuring its preservation throughout the forensic process. Principles of evidence handling, including chain of custody, documentation, and the importance of maintaining the integrity of evidence. Legal and ethical considerations related to digital evidence handling. This includes understanding privacy and confidentiality considerations and the role of expert witness testimony in courtroom presentations. Data acquisition techniques for different types of digital devices. They will learn about disk imaging, integrity verification, and the use of hash functions in maintaining data integrity. Techniques for analyzing and examining digital evidence, including file system analysis, data recovery, reconstruction techniques, and metadata analysis. The course also includes practical application of various tools and technologies used in digital forensics, such as Autopsy, The Sleuth Kit (TSK), Volatility, Plaso, Wireshark, Bulk Extractor, OSForensics, and Autopsy Browser. At the end of the course, a final exam is planned consisting of multiple-choice questions on the concepts and fundamentals arising from the course outcomes, along with practical tasks.
eForensics Course for eWarfare: Investigations, Threat Detection and Reconnaissance in the Electromagnetic Spectrum (W59)
eForensics for eWarfare: Investigations, Threat Detection, and Reconnaissance in the Electromagnetic Spectrum" is an innovative course designed to introduce learners to the application of digital forensics tools and techniques in electronic warfare. It aims to deepen participants' understanding of electronic warfare, its history, military applications, and how digital forensics is applied in warfare and intelligence. The course also focuses on the significance of electronic warfare in today's world, discussing potential threats and how to mitigate them. COURSE STRUCTURE: This course is structured into several key modules, each focusing on a specific aspect of electronic warfare. The modules are: Introduction to Electronic Warfare Notable Milestones in the Development of Electronic Warfare A Look at Air Force Radar Systems Military Application of Digital Forensics Investigating Incidents on Critical Infrastructure: Industrial Control Systems (ICS) Each module ends with a multiple-choice quiz to ensure understanding, with a pass mark of 75%. EQUIPMENT & PREREQUISITES: To participate, students will need a PC, tablet, or smartphone with an internet connection. Basic knowledge of information systems, cybersecurity, and digital forensics is recommended. ABOUT THE LECTURER: This course is led by an experienced lecturer from the Cyber Security Department of the Air Force Institute of Technology (AFIT), Kaduna. With a background in both training and consulting, the lecturer has considerable expertise in a range of relevant areas, including information and physical management, security, assurance, and control. Furthermore, he has authored numerous articles in well-established journals, including eForensics Magazine and the ISACA Journal, and has led training workshops on digital forensics and eDiscovery.
