Booking options
£19
£19
On-Demand course
All levels
Course Type: Online Learning
Duration: 8 hours 13 minutes
Tutor Support: Tutor support is included
Customer Support: 24/7 customer support is available
Quality Training: The course is designed by an industry expert
Recognised Credential: Recognised and Valuable Certification
Completion Certificate: Free Course Completion Certificate Included
Instalment: 3 Installment Plan on checkout
Gain comprehensive knowledge about forensic investigation
Understand the core competencies and principles of forensic investigation
Explore the various areas of forensic investigation
Know how to apply the skills you acquired from this course in a real-life context
Become a confident and expert pentester
Master the skills you need to propel your career forward in digital forensic investigation. This course will equip you with the essential knowledge and skillset that will make you a confident pentester and take your career to the next level. This comprehensive cyber security and digital forensics course is designed to help you surpass your professional goals. The skills and knowledge that you will gain through studying this cyber security and digital forensics course will help you get one step closer to your professional aspirations and develop your skills for a rewarding career.
This cyber security and digital forensics course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries.
This comprehensive course will teach you the theory of effective digital forensic investigation practice and equip you with the essential skills, confidence and competence to assist you in the digital forensic investigation industry. You'll gain a solid understanding of the core competencies required to drive a successful career in digital forensic investigation. This course is designed by industry experts, so you'll gain knowledge and skills based on the latest expertise and best practices. This extensive course is designed for pentester or for people who are aspiring to specialise in digital forensic investigation. This cyber security and digital forensics course has been endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. This course is not regulated by Ofqual and is not an accredited qualification.
Enrol in this cyber security and digital forensics course today and take the next step towards your personal and professional goals. Earn industry-recognised credentials to demonstrate your new skills and add extra value to your CV that will help you outshine other candidates.
This comprehensive cyber security and digital forensics course is ideal for anyone wishing to boost their career profile or advance their career in this field by gaining a thorough understanding of the subject. Anyone willing to gain extensive knowledge on this digital forensic investigation can also take this course.
Whether you are a complete beginner or an aspiring professional, this course will provide you with the necessary skills and professional competence, and open your doors to a wide number of professions within your chosen sector.
This cyber security and digital forensics course has no academic prerequisites and is open to students from all academic disciplines. You will, however, need a laptop, desktop, tablet, or smartphone, as well as a reliable internet connection.
This cyber security and digital forensics course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%.
This cyber security and digital forensics course will provide you with a fresh opportunity to enter the relevant job market and choose your desired career path. Additionally, you will be able to advance your career, increase your level of competition in your chosen field, and highlight these skills on your resume.
This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement.
The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries.
Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements.
Benefits of CPD
Improve your employment prospects
Boost your job satisfaction
Promotes career advancement
Enhances your CV
Provides you with a competitive edge in the job market
Demonstrate your dedication
Showcases your professional capabilities
The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill.
Benefits of IPHM
It will help you establish a positive reputation in your chosen field
You can join a network and community of successful therapists that are dedicated to providing excellent care to their client
You can flaunt this accreditation in your CV
It is a worldwide recognised accreditation
This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries.
Benefits of Quality License Scheme
Certificate is valuable
Provides a competitive edge in your career
It will make your CV stand out
Course Overview | |||
Course Overview | 00:06:00 | ||
Building Your Forensics Lab Environment Using VirtualBox | |||
Video - Downloading ISO and OVA Files for VirtualBox | 00:08:00 | ||
Video and lab - Create a Virtual Install of CSI Linux 2021.2 | 00:12:00 | ||
Video and Lab - Create a Kali Live (Forensic Mode) VM Using VirtualBox | 00:06:00 | ||
Video and lab - Create a Virtual Install Kali Image Using VirtualBox | 00:11:00 | ||
Video and Lab - Create Virtual Install of Windows 10 Using VirtualBox | 00:08:00 | ||
Video and Lab - Create a Virtual Install of Metasploitable2 Using VirtualBox | 00:10:00 | ||
Using Kali Forensic Mode and Autopsy | |||
Video and Lab -Getting Started with Autopsy | 00:10:00 | ||
Video and Lab - Simulate Creating a Disk Image for a Forensic Analysis | 00:11:00 | ||
Video and Lab - Examining a forensic Disk Image Using Autopsy | 00:12:00 | ||
Digital Forensics Case Management | |||
Video and Lab - Installing the WebMap-Nmap Dashboard | 00:12:00 | ||
Open-source Intelligence (OSINT) | |||
Video and Lab - Conducting OSINT Using CSI Linux Investigator | 00:08:00 | ||
Video and Lab - Find Social Media Accounts Using Sherlock | 00:07:00 | ||
Video - OSINT Framework - Overview | 00:16:00 | ||
Using Shodan to Search for Vulnerable Devices | |||
Video and Lab - Preparing CSI Investigator to Use Shodan | 00:05:00 | ||
Video and Lab - Using Shodan to Find Vulnerable Devices | 00:16:00 | ||
Video and lab - Using Shodan to Search for Vulnerable Databases | 00:08:00 | ||
Computer Forensics | |||
Video - Attaching an External USB Device in Kali | 00:07:00 | ||
Video and Lab - Acquiring a Forensic Copy of the Windows Registry | 00:15:00 | ||
Video and Lab - Analyzing the Windows Registry for Evidence | 00:14:00 | ||
Video and Lab - Dumping Wi-Fi Credentials Using netsh | 00:04:00 | ||
Video and Lab - Email Header Analysis | 00:17:00 | ||
Video and Lab - Using Shellbags to View Hidden or Deleted Folders | 00:06:00 | ||
Video and Lab - Extracting Thumbnail Images From a Suspects Machine | 00:05:00 | ||
Video and lab - Memory Forensics Using the Volatility Framework | 00:19:00 | ||
Reverse Engineering and Malware Analysis | |||
Video and Lab - Install Ghidra on CSI Linux | 00:07:00 | ||
Video and Lab - Introduction to Using Ghidra | 00:14:00 | ||
Video and Lab - Reverse Engineering crackme0x00 Using Ghidra | 00:06:00 | ||
Video and Lab - Reverse Engineering crackme0x05 Using Ghidra | 00:12:00 | ||
Video and Lab - Analyzing the WannaCry KillSwitch Using Ghidra | 00:17:00 | ||
Malware Hunting with Sysinternal Tools | |||
Video - Overview of Sysinternal Tools | 00:08:00 | ||
Video - Overview of Sysinternal's Process Explorer | 00:00:00 | ||
Video and Lab - Finding Malware with Sysinternals Process Explorer | 00:09:00 | ||
Stenography | |||
Video and Lab - Using Steghide for Hiding and Extracting Data | 00:11:00 | ||
Video and Lab - Using the EXIFtool to Read and Write EXIF Tags | 00:10:00 | ||
Network Forensics Using Wireshark | |||
Video - Overview of Wireshark 3.2 | 00:11:00 | ||
Video - Wireshark Capture Options | 00:07:00 | ||
Video - Wireshark Toolbar Icons | 00:03:00 | ||
Video and Lab - Installing a Wireless Adapter in Kali | 00:09:00 | ||
Video and Lab - Hacking a Wireless Network Using Kali Linux | 00:14:00 | ||
Video - Capturing Wireless Traffic Using Wireshark | 00:05:00 | ||
Practice What You Learned | |||
Video and Lab - CTF Lab Build for HA: Forensics | 00:11:00 | ||
Video and lab - Capture flag #1 | 00:12:00 | ||
Video and lab - Capture flag #2 | 00:10:00 | ||
Video and lab - Capture flag #3 | 00:20:00 | ||
Video and lab - Capture flag #4 | 00:09:00 | ||
Obtain Your Certificate | |||
Order Your Certificate of Achievement | 00:00:00 | ||
Get Your Insurance Now | |||
Get Your Insurance Now | 00:00:00 | ||
Feedback | |||
Feedback | 00:00:00 |