Scammer Investigations on SnapChat
The world is filled with scammers, and online messengers, such as Snapchat, seem to be filled with them. In this article, I will be going over a couple of real-life scams. We will be breaking down the scam and taking some steps to help unmask the scammers.
Apple macOS Ransomware Where Art Thou?
Ransomware is a serious business, as it technologically encapsulates a large part of the criminal element of blackmail and extortion for profit through the payment of ransom. Additionally, techniques evolve quickly and can be updated through its communication network at a moment’s notice.
Ransomware
Ransomware is a type of malicious software that locks or encrypts a user’s computer, preventing them from accessing their data or programs, information, and resources, until they pay a ransom, hence the name “ransomware”.
Browser Forensics (W57)
The course is aimed at allowing investigators to know the inner workings of the most used and well-known browsers from a digital forensics perspective. Nowadays, everything is done using the web. Most applications are web-based, which led to the importance of browser forensics for any digital forensic case. The interesting thing about browser forensics is the amount of information that you can extract and draw for a case.
The Human Element: an Analysis of the Relationships Between Social Engineering and Ransomware Attacks
To understand how the human element is exploited, this article aims to present an overview of ransomware and social engineering, discussing their relationship and focusing on how the human factor can be used as an agent to exploit becoming an attack vector.
HOW TO INVESTIGATE FILES WITH FTK IMAGER
by Mark Stam The Master File Table or MFT can be considered one of the most important files in …
Finding Advanced Malware Using Volatility
FINDING ADVANCED MALWARE USING VOLATILITY by Monnappa Ka What you should know Basic understanding of malware Knowledge of operating system …
Installing Autopsy 4.6.0 on linux | by Christian Kisutsa
Installing Autopsy 4.6.0 on linux by Christian Kisutsa Autopsy is a digital forensics tool that needs no introduction. It has …
Windows Registry extraction with FTK Imager [FREE COURSE CONTENT]
There are several ways to perform an extraction from the Windows Registry, let’s see some of the most useful. This …
Forensic Investigation of Storage Media
Tools and Procedures for Forensic Investigation of Storage Media Deivison Franco, Cleber Soares, Daniel Müller, and Joas Santos Digital data and …
Setting up a report template for OSINT investigations [COURSE MODULE 0]
In this short little video our instructor Josh presents his template for OSINT investigations. You can see what sections are …
Introduction to Mobile Forensics
Lesson one Tutorial 1. Introduction to Mobile Forensics of the online course "Advanced Smartphone Forensics" Check here >> Mobile Forensics …
ELA Photo Forensics
By: Pierluigi Paganini from Infosec Institute Error Level Analysis is a forensic method to identify portions of an image with …
Setting up Security Onion at home | By Z3R0th
Setting up Security Onion at home First off, what exactly is Security Onion and why do I care about this? …
Scammer Investigations on SnapChat
The world is filled with scammers, and online messengers, such as Snapchat, seem to be filled with them. In this article, I will be going over a couple of real-life scams. We will be breaking down the scam and taking some steps to help unmask the scammers.
Apple macOS Ransomware Where Art Thou?
Ransomware is a serious business, as it technologically encapsulates a large part of the criminal element of blackmail and extortion for profit through the payment of ransom. Additionally, techniques evolve quickly and can be updated through its communication network at a moment’s notice.
Ransomware
Ransomware is a type of malicious software that locks or encrypts a user’s computer, preventing them from accessing their data or programs, information, and resources, until they pay a ransom, hence the name “ransomware”.
The Human Element: an Analysis of the Relationships Between Social Engineering and Ransomware Attacks
To understand how the human element is exploited, this article aims to present an overview of ransomware and social engineering, discussing their relationship and focusing on how the human factor can be used as an agent to exploit becoming an attack vector.

Browser Forensics (W57)
The course is aimed at allowing investigators to know the inner workings of the most used and well-known browsers from a digital forensics perspective. Nowadays, everything is done using the web. Most applications are web-based, which led to the importance of browser forensics for any digital forensic case. The interesting thing about browser forensics is the amount of information that you can extract and draw for a case.
Cloud Forensics (W56)
Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. Large clouds often have functions distributed over multiple locations, each location being a data center. The nature of cloud computing – particularly cloud service provider management and distribution over multiple locations – makes forensic investigations difficult and seemingly impossible. Data centers alone can be a separate forensic discipline. This course merges cloud technology with sound forensic processes and principles to effectively conduct cloud forensic investigations using Amazon Web Services as a case study example.
Windows Forensics (W55)
At the end of the training, the participants will be able to reach the level of knowledge to examine devices with Windows operating systems for the purpose of detecting suspicious activity. The course will focus on Windows 10 Operating System, but we know that there are a lot of common things with server operating systems. So Windows Server systems also could be our evidence source. The course’s material will also apply to Windows 11, as there are no changes compared to Windows 10 when looking from a forensics perspective.
Natural Language Processing for OSINT & Threat Analysis (W54)
In this course, we apply Natural Language Processing to cyber threat analysis and OSINT, to assess and analyze data gained …
