Learning Computer Forensics With Infinite Skills

What to gain a solid understanding of Computer Forensics? This training course is the ideal way to get started.

Learning Computer Forensics With Infinite Skills

Price$99.00

SchoolUdemy
ScheduleOn Demand
LocationOnline
Duration11 hours
Credits0
Enroll
Rating
Reviews5
Popularity1147 Registered
In CertificateNo
Difficultyall level
EffortN/A
Course DetailsCourse FAQ

Learning Computer Forensics With Infinite Skills

Categories:
Personal Development

This video based Computer Forensics training course from Infinite Skills will teach you how to get started in this industry. Computer Forensics is a broad topic that touches on many different skills, all specific to answering legal or investigative questions in relation to a computer. This course will give you an overview of the skills you will need in order to work in this highly technical field.


Because Computer Forensics is a broad field, this course covers a lot of topics, from preparing for an investigation, to ethics, to evidence acquisition, being an expert witness and legal vs. corporate investigations. You will learn about forensic tools and how they are used, such as ProDiscover, FTK, and EnCase. This video tutorial covers wireless network investigations, malware and collecting network evidence. You will also learn about UNIX, Windows, Linux and Mac OS, in order to understand where to look for and recover evidence from.

By the conclusion of this computer based tutorial for Computer Forensics, you will have a clear understanding of what it takes to be a computer forensics investigator, and the tools and techniques available to you to find the evidence you will be looking for.

Course Details

Introduction
online
chapter
On Demand
0101 What Is Forensics?
online
lecture
On Demand
0102 Professions Needing Forensics
online
lecture
On Demand
0103 What You Should Expect From This Video
online
lecture
On Demand
0104 What You Should Know
online
lecture
On Demand
0105 What You Will Learn
online
lecture
On Demand
Legal Issues
online
chapter
On Demand
0201 Chain Of Custody
online
lecture
On Demand
0202 Evidence Acquisition
online
lecture
On Demand
0203 Validating Data Under Linux
online
lecture
On Demand
0204 Validating Data Under Windows
online
lecture
On Demand
0205 Expert Witness
online
lecture
On Demand
0206 Ethics For Experts
online
lecture
On Demand
0207 Evidence Storage
online
lecture
On Demand
0208 Rules Of Evidence
online
lecture
On Demand
Investigations
online
chapter
On Demand
0301 Differences With Legal Investigations
online
lecture
On Demand
0302 Reasons For Corporate Investigations
online
lecture
On Demand
0303 Preparing For An Investigation
online
lecture
On Demand
0304 Forensic Workstation
online
lecture
On Demand
0305 EnCase
online
lecture
On Demand
0306 FTK
online
lecture
On Demand
0307 Coroners Toolkit
online
lecture
On Demand
0308 ProDiscover Basic
online
lecture
On Demand
0309 Audit Policies
online
lecture
On Demand
0310 Reporting
online
lecture
On Demand
0311 UNIX Tools
online
lecture
On Demand
0312 Sleuth Kit
online
lecture
On Demand
0313 DEFT Linux
online
lecture
On Demand
Operating Systems
online
chapter
On Demand
0401 Windows Family
online
lecture
On Demand
0402 Mac OS X
online
lecture
On Demand
0403 Linux
online
lecture
On Demand
0404 Other Types Of Operating Systems
online
lecture
On Demand
0405 Boot Processes
online
lecture
On Demand
0406 File Systems: Windows-Based
online
lecture
On Demand
0407 File Systems: Linux
online
lecture
On Demand
0408 File Systems: Mac OS
online
lecture
On Demand
0409 File Systems: CD
online
lecture
On Demand
0410 RAID
online
lecture
On Demand
0411 Autostarting
online
lecture
On Demand
0412 Executable Types And Structure: Windows
online
lecture
On Demand
0413 Executable Types And Structure: Unix-Based
online
lecture
On Demand
0414 Disk Partitions
online
lecture
On Demand
Image Acquisition
online
chapter
On Demand
0501 Image Formats
online
lecture
On Demand
0502 Image Acquisitions Under Linux
online
lecture
On Demand
0503 Image Acquisitions Under Windows
online
lecture
On Demand
0504 Volatile Information
online
lecture
On Demand
0505 Data Recovery
online
lecture
On Demand
0506 Hard Drives
online
lecture
On Demand
Network Acquisitions
online
chapter
On Demand
0601 OSI Reference Model
online
lecture
On Demand
0602 TCP/IP
online
lecture
On Demand
0603 Network Attacks
online
lecture
On Demand
0604 Reasons For Network Acquisitions
online
lecture
On Demand
0605 Man In The Middle Attacks
online
lecture
On Demand
0606 Capturing Traffic
online
lecture
On Demand
0607 NetworkMiner
online
lecture
On Demand
0608 Other Network Tools
online
lecture
On Demand
0609 Wireless Networking
online
lecture
On Demand
0610 Wireless Tools
online
lecture
On Demand
0611 Firewalls And Their Uses
online
lecture
On Demand
0612 Intrusion Detection Systems
online
lecture
On Demand
Data Spaces
online
chapter
On Demand
0701 Alternate Data Streams
online
lecture
On Demand
0702 Deleted Files
online
lecture
On Demand
0703 Hidden Partitions
online
lecture
On Demand
0704 Slack Space And Swap File
online
lecture
On Demand
0705 Registry
online
lecture
On Demand
0706 Virtual Memory
online
lecture
On Demand
0707 System Recovery Checkpoints: Windows
online
lecture
On Demand
0708 Audit Logs And Settings
online
lecture
On Demand
Data Recovery
online
chapter
On Demand
0801 Graphics Files
online
lecture
On Demand
0802 E-Mail
online
lecture
On Demand
0803 Internet: Cache, Cookies, Etc.
online
lecture
On Demand
0804 Metadata
online
lecture
On Demand
0805 Log Files
online
lecture
On Demand
0806 Steganography
online
lecture
On Demand
0807 Steganography Techniques: Images And Video
online
lecture
On Demand
0808 Steganography Techniques: Audio And Documents
online
lecture
On Demand
0809 Steganalysis
online
lecture
On Demand
0810 Compression
online
lecture
On Demand
Virtual Machines
online
chapter
On Demand
0901 Virtual Machines
online
lecture
On Demand
0902 Checkpoints
online
lecture
On Demand
0903 Data Formats
online
lecture
On Demand
0904 Hypervisors
online
lecture
On Demand
Mobile Forensics
online
chapter
On Demand
1001 IOS
online
lecture
On Demand
1002 Android
online
lecture
On Demand
1003 Symbian OS
online
lecture
On Demand
1004 Tools
online
lecture
On Demand
1005 Memory Considerations
online
lecture
On Demand
1006 SIM Cards
online
lecture
On Demand
Malware Forensics
online
chapter
On Demand
1101 Malware Forensics
online
lecture
On Demand
1102 Static Malware Analysis
online
lecture
On Demand
1103 Dynamic Malware Analysis
online
lecture
On Demand

FAQ

Q. How long do I have access to the course materials?

A. You can view and review the lecture materials indefinitely, like an on-demand channel.

Q. What is the refund policy on the course?

A. We like to keep our users happy, so we have a 30-day no questions asked refund policy. Send an email to [email protected] for refund requests.

Q. Can I take my courses with me wherever I go?

A. Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!


Reviews of Learning Computer Forensics With Infinite Skills

  1. Posted by Johnnie Finkley| March 17, 2016

    can be my examples

  2. Excellent Course
    Posted by Nenad Herman| October 31, 2015

    Course content is comprehensive and informative. The production quality met my expectations. The instructor's delivery is interesting and engaging.

  3. Way to basic for anyone with previous forensic experience
    Posted by Eugene Filipowicz| July 13, 2015

    This is a basic course and certainly does not help anyone who already does forensics, especially if they have a degree in Computer Science. There are too many sections / modules which only present a basic overview with no details or practical exercises. I watch every lecture and was initially going to take notes until I realized there was nothing notable. Very disappointed!

  4. Good Course
    Posted by Michael| June 15, 2015

    This a broad course covering legal issues, operating systems, image aquisition and analysis. An introduction to the tools used but I felt the areas were only touched on and not in enough detail. The course would benefit from being split into amore modules with deeper information. the Mobile analysis near the end could do with a lot more work. however, this is the first course I have seen that covers Apple operating systems as well as Windows and Linux. My biggest issue with this course is the presenters voice sometimes comes across as robotic and monotone. I occasionally zoned out and even took a break of a few weeks and took other more animated courses for variety.

  5. Uninspiring.
    Posted by Charles n/a| October 08, 2014

    Course provides only a basic overview of various computer forensic tools/processes/concepts but no actual substance. The course was unhelpful to me and regrettably I'm feel compelled to leave a poor rating.

Course provided by: Udemy