eDiscovery - Introduction [FREE COURSE CONTENT]
In this short video from our Introduction to eDiscovery course by Dauda Sule we take a look at the intersection …
Read MoreWPA2 Attack Tutorial [FREE COURSE CONTENT]
This video comes from our Wireless Security Attacks online course. In this challenge, we will recover the WPA2 key using …
Read MoreDrone Incident Response - Health and Safety Considerations [FREE COURSE CONTENT]
In this short video from our Drone Forensics course you will learn what you should take into consideration when responding …
Read MoreAssembly for reverse engineering - basic programming [FREE COURSE CONTENT]
In this short video from our Software Reverse Engineering course we will learn how to write a simple program in …
Read MoreSearching public aviation records for OSINT [FREE COURSE CONTENT]
In this video from our OSINT course Josh Richards will show you how you can utilize public records and information …
Read MoreDetecting Copy-Paste Forgeries in Videos [FREE COURSE CONTENT]
In this video you can get started with detecting forgeries in videos by learning optical flow analysis: and your instructor, …
Read MoreEncrypted file system forensics - Introduction (EXT4) [FREE COURSE CONTENT]
In this video from our EXT4 File System Forensics by Divya Lakshmanan you will get a quick intro to dealing …
Read MoreSilentEye - image anti-forensics tutorial [FREE COURSE CONTENT]
In this short tutorial by Cordny Nederkoorn, the instructor of our MacOS Anti-Forensics course, you will learn how to perform …
Read MoreProcessing the $Boot file [FREE COURSE CONTENT]
In this video from our NTFS Forensics course our instructor, Divya Lakshmanan, will show you how to process the $DATA …
Read MoreSpiderfoot configuration and usage [FREE COURSE CONTENT]
In this tutorial from our Social Engineering course, you can learn how to use SpiderFoot to automate OSINT collection - …
Read More