The Extortion of Things - by Stuart Peck
Extortion is a tried and tested model for extracting money by unscrupulous individuals over the centuries. The most popular is …
5 min read
Is the Internet of Things a scary proposition for organizations? Expert discussion on cybersecurity - IBM’s Cyber Beat Live!
Can we drive the innovation and possibilities of the Internet of Things while maintaining security? How can we minimize cybersecurity …
3 min read
Stay informed. This is your biggest weapon - Interview with Raj Samani, CTO of intel Security
Hi Folks, Today we would like to serve you our interview with Raj Samani, CTO of Intel Security. We have …
7 min read
Drones and the Internet of Things in the cybersecurity equation – IBM Cyber Beat Live
Technological advancement is unleashing an age of extensive innovation that is chock full of unmanned aerial vehicles known as drones, …
124 min read
HOW TO INVESTIGATE FILES WITH FTK IMAGER
by Mark Stam The Master File Table or MFT can be considered one of the most important files in …
5 min read
Finding Advanced Malware Using Volatility
FINDING ADVANCED MALWARE USING VOLATILITY by Monnappa Ka What you should know Basic understanding of malware Knowledge of operating system …
5 min read
Windows Registry extraction with FTK Imager [FREE COURSE CONTENT]
There are several ways to perform an extraction from the Windows Registry, let’s see some of the most useful. This …
Installing Autopsy 4.6.0 on linux | by Christian Kisutsa
Installing Autopsy 4.6.0 on linux by Christian Kisutsa Autopsy is a digital forensics tool that needs no introduction. It has …
5 min read
Forensic Investigation of Storage Media
Tools and Procedures for Forensic Investigation of Storage Media Deivison Franco, Cleber Soares, Daniel Müller, and Joas Santos Digital data and …
Introduction to Mobile Forensics
Lesson one Tutorial 1. Introduction to Mobile Forensics of the online course "Advanced Smartphone Forensics" Check here >> Mobile Forensics …
5 min read
File System Analysis with Binwalk | By Alex Ocheme Ogbole
File System Analysis with Binwalk Binwalk is a simple Linux tool used for analysis of binary image files. Analyzing binary image …
5 min read
Artificial Intelligence in Digital Forensics
This article explores how AI and AI powered tools and techniques are transforming digital forensics, enhancing its effectiveness, and enabling investigators to navigate the ever-evolving landscape of cybercrime.
Steganography – A Hidden Reality Far Beyond What The Eyes Can See
Steganography is an ancient secret communication technique that consists of hiding messages within other means of communication, such as images, texts, or physical objects. The term "steganography" derives from the Greek words "steganos" (hidden or covered) and "graphein" (to write), reflecting its nature.
Reflections on Artificial Intelligence and Digital Forensics
An Artificial Intelligence is, basically, the association between an algorithm (or algorithms) and a set of data prepared for decision making. The algorithm is trained on this database and learns from that data. There are a variety of AIs applied from pattern recognition to the creation of images from certain guidelines passed to an algorithm by the end user.
Applications of Artificial Intelligence in Cybersecurity
Cybersecurity has become a major concern in the digital era. Data breaches, ID theft, cracking the captcha, and other such stories abound, affecting millions of individuals as well as organizations. New challenges became endless while seeking correct or suitable controls and procedures and implementing them with specific perfection for tackling cyber-attacks and crimes.
eForensics Course for eWarfare: Investigations, Threat Detection and Reconnaissance in the Electromagnetic Spectrum (W59)
eForensics for eWarfare: Investigations, Threat Detection, and Reconnaissance in the Electromagnetic Spectrum" is an innovative course designed to introduce learners to the application of digital forensics tools and techniques in electronic warfare. It aims to deepen participants' understanding of electronic warfare, its history, military applications, and how digital forensics is applied in warfare and intelligence. The course also focuses on the significance of electronic warfare in today's world, discussing potential threats and how to mitigate them. COURSE STRUCTURE: This course is structured into several key modules, each focusing on a specific aspect of electronic warfare. The modules are: Introduction to Electronic Warfare Notable Milestones in the Development of Electronic Warfare A Look at Air Force Radar Systems Military Application of Digital Forensics Investigating Incidents on Critical Infrastructure: Industrial Control Systems (ICS) Each module ends with a multiple-choice quiz to ensure understanding, with a pass mark of 75%. EQUIPMENT & PREREQUISITES: To participate, students will need a PC, tablet, or smartphone with an internet connection. Basic knowledge of information systems, cybersecurity, and digital forensics is recommended. ABOUT THE LECTURER: This course is led by an experienced lecturer from the Cyber Security Department of the Air Force Institute of Technology (AFIT), Kaduna. With a background in both training and consulting, the lecturer has considerable expertise in a range of relevant areas, including information and physical management, security, assurance, and control. Furthermore, he has authored numerous articles in well-established journals, including eForensics Magazine and the ISACA Journal, and has led training workshops on digital forensics and eDiscovery.
The Complete Path to Passing the CHFI Certification Exam - Digital Forensics Mastery Program (W58)
We are proud to offer our comprehensive 15-module course, "Become a Certified Computer Forensics Investigator: The Complete Path to Success in Passing the CHFI Certification Exam." This course is designed to provide you with a deep understanding of the computer investigation process and prepare you to become a certified computer forensics investigator. Our course covers a wide range of topics including data acquisition, network forensics, database forensics, cloud forensics, mobile device forensics, and more. Each module is designed to give you hands-on experience with the tools and techniques used in digital forensics investigations. You will also learn how to identify and counteract anti-forensics techniques and recognize potential cyber threats. Our experienced instructors will guide you through the course material and help you prepare for the CHFI certification exam. Additionally, you will have access to our exclusive community on Discord, where you can share insights and experiences with fellow students, ask questions of our instructors, and network with other professionals in the field. After completing the course, you will have the knowledge and skills needed to succeed as a computer forensics investigator and earn the CHFI certification. Enrol today and start your journey to becoming a certified computer forensics investigator!
Browser Forensics (W57)
The course is aimed at allowing investigators to know the inner workings of the most used and well-known browsers from a digital forensics perspective. Nowadays, everything is done using the web. Most applications are web-based, which led to the importance of browser forensics for any digital forensic case. The interesting thing about browser forensics is the amount of information that you can extract and draw for a case.
Cloud Forensics (W56)
Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. Large clouds often have functions distributed over multiple locations, each location being a data center. The nature of cloud computing – particularly cloud service provider management and distribution over multiple locations – makes forensic investigations difficult and seemingly impossible. Data centers alone can be a separate forensic discipline. This course merges cloud technology with sound forensic processes and principles to effectively conduct cloud forensic investigations using Amazon Web Services as a case study example.