Digital Forensics for Pentesters - Hands-On Learning

Instructor: Packt - Course Instructors

What you'll learn

  •   Understand the principles and techniques of forensic imaging for devices.
  •   Apply methods to recover deleted data from various operating systems.
  •   Create professional and legal digital forensic reports.
  •   Utilize various forensic tools effectively for digital forensic investigations.
  • Skills you'll gain

  •   Cyber Threat Intelligence
  •   Cyber Security Assessment
  •   Microsoft Windows
  •   Network Monitoring
  •   Security Testing
  •   Open Source Technology
  •   Cyber Operations
  •   Software Installation
  •   Image Analysis
  •   Virtual Machines
  •   Penetration Testing
  •   File Management
  •   Malware Protection
  •   Threat Detection
  •   Network Protocols
  •   Network Analysis
  •   Network Security
  •   Virtualization
  •   System Configuration
  • There are 11 modules in this course

    - You'll master forensic tools like Kali Forensic Mode, Autopsy, and Shodan, gaining hands-on experience in acquiring and analyzing forensic disk images, managing digital forensics cases, and conducting OSINT investigations. - You'll also delve into reverse engineering malware using Ghidra and performing network forensics with Wireshark. - The course culminates in Capture the Flag exercises to apply your skills in real-world scenarios. By the end, you'll have a robust understanding of digital forensics processes, making you a proficient penetration tester. Designed for aspiring and professional penetration testers, cybersecurity analysts, and IT professionals with basic networking and cybersecurity knowledge, this course ensures practical, real-world experience through interactive learning. This course is tailored for technical professionals, cybersecurity enthusiasts, and pentesters seeking to deepen their expertise in digital forensics. Participants should have a foundational understanding of networking and basic Linux operations. Familiarity with virtual environments and command-line interfaces will be beneficial but not mandatory.

    Building Your Forensics Lab Environment Using VirtualBox

    Using Kali Forensic Mode and Autopsy

    Digital Forensics Case Management

    Open-Source Intelligence (OSINT)

    Using Shodan to Search for Vulnerable Devices

    Computer Forensics

    Reverse Engineering and Malware Analysis

    Stenography

    Network Forensics Using Wireshark

    Practice What You learned

    Explore more from Computer Security and Networks

    ©2025  ementorhub.com. All rights reserved