Photographic Evidence and Photographic Evidence Tampering
The following is just an introduction to an advanced forensics course focusing on photographic evidence. If you want to learn …
Read MoreDrive Geometry [FREE COURSE VIDEO]
In this short video from our Digital Forensic Imaging online course we take a deep dive into drive geometry - …
Read MoreShodan in the CLI [FREE COURSE VIDEO]
In this video from our Shodan, IoT, and OSINT blast course your instructor, Maciej Makowski, will show you how to …
Read MoreDisassembling High Level Languages [FREE COURSE CONTENT]
This material comes from our Software Reverse Engineering course. During this tutorial you will learn how to tackle disassembling high …
Read MoreAndroid Malware Analysis Tools [FREE COURSE VIDEO]
In this video from our Android Malware Analysis course by Tom Sermpinis you can see how Android malware analysis is …
Read MoreAndroid Security Model, Infections and Detection Methods [FREE COURSE CONTENT]
In this short excerpt from our Android Malware Analysis course by Tom Sermpinis you can learn how the Android Security …
Read MoreDeepfakes: Genesis [FREE COURSE CONTENT]
In this text from our Digital Visual Media Anti–Forensics and Counter Anti–Forensics online course by Raahat Devender Singh we discover …
Read MoreThunderbird Artifacts [FREE COURSE CONTENT]
In this excerpt from our Ubuntu Forensics course we will take a closer look at Thunderbird artifacts. Thunderbird is a …
Read MoreAndroid Forensics Challenge [FREE COURSE CONTENT]
In this course content blog we want to share an Android Forensics challenge - we are publishing evidence files from …
Read MoreFile System Tunneling [FREE COURSE CONTENT]
In this video from our NTFS Forensics course our instructor, Divya Lakshmanan, will explain what is file system tunneling. This concept is an …
Read More