Course Curriculum

Before the course
(W34M00) DVM anti-forensics and counter-anti-forensics – introduction FREE 00:00:00
Module 1
(W34M00) Module 1 Overview FREE 00:00:00
Chapter 1
(W34M01) Forensic Applications of Visual Evidence 00:00:00
(W34M02) Admissibility of Digital Images and Videos: Rules of Evidence 00:00:00
(W34M03) Visual Evidence and the Fallacy of Infallibility 00:00:00
(W34M04) Forensic Analysis of Visual Evidence 00:00:00
(W34M05) Content Authentication: The Concept of Identifying Traces 00:00:00
(W34M06) Tamper Detection: The Challenge and its Significance 00:00:00
(W34M07) Summary & References 00:00:00
Chapter 2
(W34M08) Image and Video Forgeries 00:00:00
Chapter 3
(W34M09) Digital Visual Media Forgery Detection: An Introduction 00:00:00
(W34M10) Methods of Digital Visual Media Tamper Detection 00:00:00
(W34M11) Passive–Blind Forgery Detection Techniques – Part 1 FREE 00:00:00
(W34M12) Passive–Blind Forgery Detection Techniques – Part 2 00:00:00
(W34M13) Content Authentication via Tamper Detection: Concluding Remarks on the Current State of Affairs 00:00:00
(W34M14) Summary & References 00:00:00
Module 1 Video Tutorials
(W34M15) Video tutorial I 00:00:00
(W34M16) Video Tutorial II 00:00:00
Appendices
(W34M17) Appendix A – Forensic Analysis of Photographic and Video Evidence 00:00:00
(W34M18) Appendix B – Source Authentication 00:00:00
(W34M19) Appendix C – Integrity Verification Measures 00:00:00
(W34M20) Appendix D – Active Non–Blind Tamper Detection Solutions 00:00:00
Module 1 Assignments
(W34Q01) Module 1 Quiz 00:06:00
(W34Q02) Crossword Puzzle 00:11:00
(W34M21) Module 1 Exercises 00:00:00
(W34A01) Rules of Evidence Exercise 30, 00:00
(W34A02) Mini Case Study 30, 00:00
(W34A03) Reverse Multiple Choice Question 30, 00:00
Module 2
(W34M22) Module 2 Introduction 00:00:00
Chapter 1
(W34M23) Deepfakes: Genesis 00:00:00
(W34M24) Kate McKinnon as Hillary Clinton 00:00:00
(W34M25) Nicholas Cage as Jean-Luc Picard in Star Trek 00:00:00
(W34M26) An Introduction to Deepfakes and Fake Videos 00:00:00
(W34M27) History of Deepfakes 00:00:00
(W34M28) Here are some examples of the uncanny valley in action, mostly from video games. 00:00:00
(W34M29) Deepfake Detection: Current State of Affairs 00:00:00
(W34M30) Summary & References 00:00:00
Chapter 2
(W34M31) O, what a goodly outside falsehood hath! 00:00:00
(W34M32) Miss Ping (Tumba Ping Pong Show) by Slightly Mad Max & DJ Coolman starring Miss Ping 00:00:00
(W34M33) Superhuman Tape Measure Skills by spmconstructionmn 00:00:00
(W34M34) The Mirror Ball Illusion [known as ‘Magically throwing a ball through a mirror (OPTICAL ILLUSION)’ on YouTube] by Kevin Perry 00:00:00
(W34M35) Rush Hour by Fernando Livschitz (Posted by Myles Scott for Some Reason) 00:00:00
(W34M36) Summary & References 00:00:00
Module 2 Assignments
(W34M37) Module 2 Exercises- Deepfakes and Other Fake Videos 00:00:00
(W34A04) Exercise – Digital Faces 30, 00:00
(W34A05) Exercise: Movie Magic 30, 00:00
(W34A06) Exercise: Fake Video Detection 30, 00:00
Module 3
(W34M38) Module 3 Introduction 00:00:00
Chapter 1
(W34M39) Anti–Forensics and Counter Anti–Forensics: Fundamentals 00:00:00
(W34M40) Visual Media Anti–Forensics 00:00:00
(W34M41) Classification of Anti–Forensic Strategies 00:00:00
(W34M42) Targeted vs. Universal 00:00:00
(W34M43) Counter Anti–Forensics 00:00:00
(W34M44) Summary & References 00:00:00
Chapter 2
(W34M45) Source Identification Anti–Forensics 00:00:00
(W34M46) Fingerprint Removal and Copy Attacks (aka Signature Removal and Substitution Attacks) 00:00:00
(W34M47) Manipulation of Quantization Tables 00:00:00
(W34M48) Source Identification Counter Anti–Forensics 00:00:00
(W34M49) Summary & References 00:00:00
Chapter 3
(W34M50) Tamper Detection: Anti–Forensics and Counter Anti–Forensics 00:00:00
(W34M51) Anti-Forensic Properties of Compression and Effect of Compression on Resampling Detection 00:00:00
(W34M52) Effect of Compression on Copy–Paste Detection 00:00:00
(W34M53) Anti–Forensic Properties of Noise and Hiding Traces of JPEG Compression 00:00:00
(W34M54) Hiding Traces of Resampling 00:00:00
(W34M55) Other Anti–Forensic Strategies 00:00:00
(W34M56) Tamper Detection Counter Anti–Forensics 00:00:00
(W34M57) Targeted Counter Anti–Forensics 00:00:00
(W34M58) Smarter Forensics 00:00:00
(W34M59) Final Thoughts 00:00:00
Module 3 Video Tutorial
(W34M60) Module 3 Video Tutorial 00:00:00
Module 3 Assignments
(W34M61) Module 3 Assignments 00:00:00
(W34A07) Module 3 Exercises 30, 00:00
(W34Q03) Final Quiz 00:12:00
TAKE THIS COURSE
  • $249.00 $219.00
  • UNLIMITED ACCESS
  • Course Certificate
155 STUDENTS ENROLLED

Certificate Validation

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013