Digital Forensics for Pentesters - Hands-On Learning

Digital forensics is becoming very important in cyber security to detect and backtrack Black Hat criminals. It is essential to remove hackers’ malicious backdoors/malware and trace them back to avoid possible future incidents.

This course acts as digital forensics’ primer for pentesters and cybersecurity professionals wanting to expand their knowledge and add advanced tools and skills to their resumes.

Make sure you understand the difference between watching and applying.

The course is an excellent primer for anyone considering a career in digital forensics. It’s important to understand the difference between digital forensics and computer security.

All resources and code files are available here: https://github.com/PacktPublishing/Digital-Forensics-for-Pentesters---H…

Type
video
Category
publication date
2021-09-28
what you will learn

Learn how to forensically image devices
Learn how to recover deleted data from various operating systems
Learn how to produce professional and legal digital forensic reports
Learn how to properly handle digital media before and during investigations
Learn how to utilize various forensic tools for digital forensic investigations
Learn how to analyze and reverse engineer software and malware

duration
448
key features
Learn about using Kali Forensic Mode and Autopsy * Explore open source intelligence and OSINT * Learn how to dump Wi-Fi credentials using netsh
approach
This course will consist of video tutorials and lab files that demonstrate the concepts of digital forensics.
audience
This course is for pentesters interested in digital forensic investigations and for anyone interested in digital forensics as it relates to pentesting and ethical hacking.
meta description
Learn about digital forensics, pentesting, and ethical hacking
short description
Digital forensics is becoming very important in cyber security to detect and backtrack Black Hat criminals. It is essential to remove hackers’ malicious backdoors/malware and trace them back to avoid possible future incidents.
subtitle
Digital forensics applies to pentesting and conducting a digital forensic investigative response
keywords
Ethical Hacking, Hacking, Penetration testing, Pentesting, Digital Forensics, Kali Linux
Product ISBN
9781803231969