Video Lectures

32x32

Chapter 1 : Computer Forensics
Topic : Introduction to Computer Forensics and standard procedure
Content : computer forensic 21 MB ,9:52 MIN , THEORY


32x32

Chapter 1 : Computer Forensics
Topic : Introduction to Computer Forensics and standard procedure
Content : why is computer forensic important encryption steganography compression 13 MB ,9:9 MIN , THEORY


32x32

Chapter 1 : Computer Forensics
Topic : computer forensic process steps
Content : steps what things are we investigating? what evidence can we recover at the time of investigating? 5 MB ,3:27 MIN , THEORY


32x32

Chapter 1 : Computer Forensics
Topic : Incident Verification and System Identification
Content : introduction to incident goals of incident response 16 MB ,7:16 MIN , THEORY


32x32

Chapter 1 : Computer Forensics
Topic : Incident Verification and System Identification
Content : who is involved in the incident response process csirt 11 MB ,7:4 MIN , THEORY


32x32

Chapter 1 : Computer Forensics
Topic : Incident Verification and System Identification
Content : incident response seven components steps 1-pre-incident preparation a)organization b)CSIRT 27 MB ,18:25 MIN , THEORY


32x32

Chapter 1 : Computer Forensics
Topic : Incident Verification and System Identification
Content : 2-Detection of incidents 3-initial response 4-formulate a response strategy considering the totality of the circumstances considering appropriate responses 5-investigate the incident 6-reporting document immediately write concisely and clearly use a standard format use editors 7-resolution 29 MB ,14:8 MIN , THEORY


32x32

Chapter 1 : Computer Forensics
Topic : Incident Verification and System Identification
Content : taking action legal action administration action incident action 20 MB ,9:20 MIN , THEORY


32x32

Chapter 1 : Computer Forensics
Topic : Incident Verification and System Identification
Content : computer security data collection forensic analysis host based information initial live response in depth response full live response 30 MB ,10:8 MIN , THEORY


32x32

Chapter 1 : Computer Forensics
Topic : Incident Verification and System Identification
Content : activities in initial response and phase after detection/identification of an incident initial response phase obtaining preliminary information documenting steps to take 1-establishing an incident notification procedure 2-recording the details after initial detection a-general information b-more specific details case notes 3-incident declaration 4- assembling the csirt a-determining increase procedures b-implementing notification procedures c-scoping an incident and assembling the appropriate resources 44 MB ,28:6 MIN , THEORY


32x32

Chapter 1 : Computer Forensics
Topic : Incident Verification and System Identification
Content : 5-assigning a team leader assigning technical staff 6-performing traditional investigative steps a-host-based evidence b-network-based evidence c-other evidence 7-conducting interviews getting contact information interviewing system administrators interviewing managers interviewing end users 8-formulating a response strategy response strategy consideration policy verification 38 MB ,21:19 MIN , THEORY


32x32

Chapter 1 : Computer Forensics
Topic : Recovery of Erased and damaged data,
Content : Recovery of Erased and damaged data, types of damage 29 MB ,10:24 MIN , THEORY


32x32

Chapter 1 : Computer Forensics
Topic : Recovery of Erased and damaged data,
Content : recovery deleted files on windows system recovering unallocated space,free space and slack space 31 MB ,20:10 MIN , THEORY


32x32

Chapter 1 : Computer Forensics
Topic : Disk Imaging and Preservation
Content : disk imaging/file duplication and preservation 1-qualified forensic duplicate 2-restored image 3-mirror image forensic duplication/disk imaging tools requirement 18 MB ,8:4 MIN , THEORY


32x32

Chapter 1 : Computer Forensics
Topic : Disk Imaging and Preservation,
Content : forensic duplication/disk imaging tools requirement 7 MB ,4:10 MIN , THEORY


32x32

Chapter 1 : Computer Forensics
Topic : Disk Imaging and Preservation
Content : creating a forensic duplicate of hard drive, 20 MB ,13:48 MIN , THEORY


32x32

Chapter 1 : Computer Forensics
Topic : Disk Imaging and Preservation
Content : creating qualified forensic duplicate of a hard drive 23 MB ,15:31 MIN , THEORY


32x32

Chapter 1 : Computer Forensics
Topic : Automated Search Techniques, Forensics Software
Content : Automated Search Techniques, Forensics Software 21 MB ,10:32 MIN , THEORY


32x32

Chapter 1 : Computer Forensics
Topic : Forensics Software
Content : Forensics Software 19 MB ,8:34 MIN , THEORY


32x32

Chapter 2 : network forensic
Topic : Introduction to Network Forensics and tracking network traffic
Content : Introduction to Network Forensics and tracking network traffic and securing a network 25 MB ,17:37 MIN , THEORY


32x32

Chapter 2 : netwok forensic
Topic : Reviewing Network Logs
Content : Reviewing Network Logs 9 MB ,5:26 MIN , THEORY


32x32

Chapter 2 : network forensic
Topic : Network Forensics Tools,
Content : Network Forensics Tools, 9 MB ,5:26 MIN , THEORY


32x32

Chapter 2 : network forensic
Topic : Network Forensics Tools,
Content : packet sniffers zero day attack honeypot 24 MB ,15:27 MIN , THEORY


32x32

Chapter 2 : network forensic
Topic : Performing Live Acquisitions,Order of Volatility, Standard Procedure
Content : Performing Live Acquisitions,Order of Volatility, Standard Procedure 17 MB ,12:3 MIN , THEORY


32x32

Chapter 2 : network forensic
Topic : Order of Volatility
Content : Order of Volatility 5 MB ,3:30 MIN , THEORY


32x32

Chapter 3 : cell phone and mobile device foremsic
Topic : Overview
Content : Overview,introduction,mobile phone basics,cdma,gsm,tdma 37 MB ,18:46 MIN , THEORY


32x32

Chapter 3 : cell devices and mobile forensic
Topic : Overview
Content : iden,d-amps,edge,ofdm,4g networks 31 MB ,18:4 MIN , THEORY


32x32

Chapter 3 : cell devices and mobile forensic
Topic : overview
Content : inside mobile devices,sim cards,inside pda's 18 MB ,10:57 MIN , THEORY


32x32

Chapter 3 : cell devices and mobile forensic
Topic : Acquisition Procedures for Cell Phones and Mobile Devices
Content : Acquisition Procedures for Cell Phones and Mobile Devices,mobile forensic,sim card reader 21 MB ,12:17 MIN , THEORY


32x32

Chapter 1 : Internet Forensic
Topic : Introduction to Internet Forensics
Content : Introduction to Internet Forensics 31 MB ,10:33 MIN , THEORY


32x32

Chapter 1 : Internet Forensic
Topic : World Wide Web Threats,Hacking and Illegal access
Content : Hacking and Illegal access 19 MB ,9:7 MIN , THEORY


32x32

Chapter 1 : Internet Forensic
Topic : World Wide Web Threats, Hacking and Illegal access
Content : port scans,address spoofing,ip spoofing,arp spoofing,dns spoofing,placement of trojans,placement of tracking devices and software, 38 MB ,21:31 MIN , THEORY


32x32

Chapter 1 : iinternet forensic
Topic : World Wide Web Threats, Hacking and Illegal access
Content : placement of packet capture and protocol analyzer software,prevention and response,understanding password cracking 33 MB ,18:51 MIN , THEORY


32x32

Chapter 1 : E-mail Forensics
Topic : understanding technical protocol
Content : protocol exploits,denial of services, 45 MB ,24:16 MIN , THEORY


32x32

Chapter 1 : Internet Forensic
Topic : source routing attack
Content : application exploit, unix exploit, rootkit attacks, nfs exploits, 28 MB ,16:52 MIN , THEORY


32x32

Chapter 1 : Internet Forensic
Topic : attacking with trojans viruses and worms
Content : trojans, viruses worms ,obsence and incident transmission 21 MB ,15:12 MIN , THEORY


32x32

Chapter 2 : email forensic
Topic : Messenger Forensics: Yahoo Messenger
Content : Messenger Forensics: Yahoo Messenger,data analysis,social media forensic 12 MB ,6:21 MIN , THEORY


32x32

Chapter 1 : Internet Forensic
Topic : source routing attack
Content : router exploit, bug exploit, mail bombs, browser exploits,web spoofing, web server exploit,buffer overflows,prevention and response 52 MB ,25:22 MIN , THEORY


32x32

Chapter 2 : email forensic
Topic : e-mail analysis, e-mail headers and spoofing, Laws against e-mail Crime
Content : email clients and servers,e-mail analysis, e-mail headers and spoofing, Laws against e-mail Crime,the can-spam act,section 66A 46 MB ,31:54 MIN , THEORY


32x32

Chapter 2 : email forensic
Topic : Cookie Storage and Analysis, Analyzing Cache and temporary internet files, Web browsing activity reconstruction
Content : Cookie Storage and Analysis, Analyzing Cache and temporary internet files,windows temporary internet files,temporary files,how is the data stored, Web browsing activity reconstruction 15 MB ,11:12 MIN , THEORY


32x32

Chapter 1 : Investigation, Evidence presentation and Legal aspects of Digital Forensics
Topic : Investigation, Evidence
Content : Investigation, Evidence,types of evidence,evidence characteristics, 19 MB ,8:50 MIN , THEORY


32x32

Chapter 1 : Investigation, Evidence presentation and Legal aspects of Digital Forensics
Topic : Authorization to collect the evidence, Acquisition of Evidence
Content : Authorization to collect the evidence, Acquisition of Evidence 33 MB ,14:10 MIN , THEORY


32x32

Chapter 1 : Investigation, Evidence presentation and Legal aspects of Digital Forensics
Topic : Authentication of the evidence, Analysis of the evidence
Content : Authentication of the evidence, Analysis of the evidence 10 MB ,2:21 MIN , THEORY


32x32

Chapter 1 : Investigation, Evidence presentation and Legal aspects of Digital Forensics
Topic : Reporting on the findings, Testimony
Content : Reporting on the findings, Testimony,report goals,report writing guidelines,preparing for testimony,documenting and preparing evidence,reviewing your role,preparing technical definitions 12 MB ,9:21 MIN , THEORY


32x32

Chapter 2 : Introduction to Legal aspects of Digital Forensics
Topic : Laws & regulations,Information Technology Act
Content : Laws & regulations,Information Technology Act,criminal law,civil law,regulatory law,levels of law 11 MB ,9:10 MIN , THEORY


32x32

Chapter 2 : Introduction to Legal aspects of Digital Forensics
Topic : Giving Evidence in court, Case Study Cyber Crime cases
Content : levels of culpability:internet,knowledge,recklessness,negligence,level and burden of proof criminal versus civil cases 10 MB ,7:41 MIN , THEORY


32x32

Chapter 2 : Introduction to Legal aspects of Digital Forensics
Topic : Information Technology Act, Giving Evidence in court Case Study Cyber Crime cases, Case Study Cyber Crime cases
Content : Information Technology Act, Giving Evidence in court,testifying in a cybercrime case,Cyber Crime cases, Case Study Cyber Crime cases 10 MB ,7:54 MIN , THEORY


32x32

Chapter 1 : Investigation, Evidence presentation and Legal aspects of Digital Forensics
Topic : forensic duplications
Content : qualified forensic duplicate,restored image,mirror image,,creating a forensic tool duplicate of hard drive 18 MB ,8:4 MIN , THEORY


32x32

Chapter 1 : Investigation, Evidence presentation and Legal aspects of Digital Forensics
Topic : recovery files
Content : recovery files 31 MB ,20:10 MIN , THEORY


The Shikshak App

The Shikshak App is an honest attempt to provide quality education.

https://play.google.com/store/apps/details?id=com.weit.theshikshak&hl=en_IN