Skip to main content

Digital Media Forensics Essentials Labs

Code: E004 Category: Tag:

Learn the security techniques used by the Internet’s most skilled professionals. This Digital Media Forensics Essentials lab bundle, which includes 19 distinct, hands-on labs, will provide you with an introduction to media collection, imaging and analysis.

Digital Media Forensics Essentials Labs Delivery Methods
6-month access to CYBRScore Digital Media Forensics Essentials Labs
Content aligned to Digital Forensics Training: Tools and Techniques
Digital Media Forensics Essentials Labs Course Benefits
Detect, identify, and analyze malicious activityUse detection various tools and tools like Wireshark and Snort to read, capture, and analyze trafficIdentify and remove trojans, malicious files, and/or processes
Digital Media Forensics Lab Content
Analyze Malicious Activity in Memory Using Volatility

Students will use the open source Volatility tool to analyze a memory snapshot and determine what malicious software has infected the victim machine.

Conduct Log Analysis and Cross Examination for False Positives
Creating a Baseline Using the Windows Forensic Toolchest (WFT)
Data Recovery with Autopsy
Detect the Introduction and Execution of Malicious Activity
Dynamic Malware Analysis Capstone
Identify Access to a LINUX Firewall Through SYSLOG Service
Identify and Remove Trojan Using Various Tools
Identify Suspicious Information in VM Snapshots
Identify Whether High-Risk Systems Were Affected
Image Forensics Capstone
Live Imaging with FTK Imager Lite
Memory Extraction and Analysis
Network Miner
Open Source Password Cracking
Participate in Attack Analysis Using Trusted Tool Set
Using Snort and Wireshark to Analyze Traffic

Request Quotes

Register now

Lean IT: Achieving Foundation Certification Training

Writing SQL Queries with SQL Server Management Studio

PRINCE2® 6th Edition Foundation and Practitioner Certification Training

Building Modern Java Enterprise Apps: JPA, EJB3, & JSF Training

Certified CMMC Assessor Level 1 Training (CCA-1)

Developing User Requirements Training: The Key to Project Success

Introduction to Cisco IOS XR (IOSXR100)

Introduction to Julia Programming for Artificial Intelligence Training

Understanding Cisco Data Centre Foundations (DCFNDU v1.0) Training

Social Engineering Training: Deceptions and Defenses

arالعربية