EXT4 Layout [FREE COURSE CONTENT]
In this video from our EXT4 File System Forensics by Divya Lakshmanan you learn all about the EXT4 layout. It's one of the …
Read MoreCyberChef Walkthrough [FREE COURSE CONTENT]
In this short tutorial by Cordny Nederkoorn, the instructor of our MacOS Anti-Forensics course, you will learn how to use CyberChef …
Read MoreAndroid Boot Process [FREE COURSE CONTENT]
In this video from our Android Mobile Forensics online course, your instructor Divya Lakshmanan will take you through the Android …
Read MorePattern Noise Based Source Camera Identification [FREE COURSE CONTENT]
In this excerpt from our Digital Video Forensics online course by Dr Raahat Singh we will deal with the complex …
Read MoreFTK Imager Introduction [FREE COURSE CONTENT]
FTK Imager is a must-have tool for any forensics investigator worth their salt. It's versatile and useful in handling evidence …
Read MoreWindows Registry extraction with FTK Imager [FREE COURSE CONTENT]
There are several ways to perform an extraction from the Windows Registry, let’s see some of the most useful. This …
Read MoreYARA tutorial: detecting malicious documents [FREE COURSE CONTENT]
In this video from our Analyzing Malicious Documents course we learn how to set up YARA to detect malicious documents. …
Read MoreSQLite3 for extracting databases [FREE COURSE CONTENT]
In this short video from our Ubuntu Forensics course we'll train extracting databases with SQLite3. Among other tools used to …
Read MoreNessus: scanning for vulnerabilities [FREE COURSE CONTENT]
In this video from our Exploitation with Armitage online course your instructor and our long-time collaborator, Paul Janes, goes through …
Read MoreRekall: Searching for a rogue process [FREE COURSE CONTENT]
In this short video from our Live Analysis with Rekall online course your instructor, Paulo Pereira, will show you a …
Read More