Pluralsight - Digital Forensics Tools in Kali Linux - Imaging and Hashing (Size: 517.08 MB)
| | 01_01-Introduction.mp4 | 10.08 MB |
| | 01_02-About Linux.mp4 | 7.73 MB |
| | 01_03-About Kali Linux.mp4 | 3.96 MB |
| | 01_04-About Digital Forensics.mp4 | 9.42 MB |
| | 01_05-What Does It Take to Be a Forensic Examiner.mp4 | 3.64 MB |
| | 01_06-What We Covered.mp4 | 4.09 MB |
| | 02_01-Getting Started with Kali Forensics.mp4 | 3.49 MB |
| | 02_02-Downloading Kali Linux.mp4 | 20.33 MB |
| | 02_03-Running Kali Linux LiveDVD.mp4 | 15.64 MB |
| | 02_04-Running Kali Linux Virtual Machine.mp4 | 12.68 MB |
| | 02_05-Updating Kali Linux.mp4 | 35.96 MB |
| | 02_06-Installing and Removing Packages.mp4 | 22.79 MB |
| | 02_07-Kali Linux as a Forensic Workstation.mp4 | 25.99 MB |
| | 02_08-What We Covered.mp4 | 5.09 MB |
| | 03_01-Introduction.mp4 | 11.31 MB |
| | 03_02-What Are Forensic Images.mp4 | 22.24 MB |
| | 03_03-Digital Storage Media.mp4 | 22.17 MB |
| | 03_04-Sterilizing Media Storage Devices.mp4 | 27.7 MB |
| | 03_05-dd.mp4 | 19.43 MB |
| | 03_06-dcfldd.mp4 | 18.53 MB |
| | 03_07-dc3dd.mp4 | 16.34 MB |
| | 03_08-guymager.mp4 | 16.48 MB |
| | 03_09-libewf.mp4 | 16.58 MB |
| | 03_10-afflib.mp4 | 9.55 MB |
| | 03_11-What We Covered.mp4 | 2.68 MB |
| | 04_01-Introduction.mp4 | 9.42 MB |
| | 04_02-How Does Hashing Work.mp4 | 11.98 MB |
| | 04_03-Hashing Algorithms.mp4 | 6.79 MB |
| | 04_04-Hashing in Digital Forensics.mp4 | 3.62 MB |
| | 04_05-sumtools.mp4 | 21.17 MB |
| | 04_06-rahash2.mp4 | 42 MB |
| | 04_07-hashdeep Tools.mp4 | 33.69 MB |
| | 04_08-hashidentifier.mp4 | 1.71 MB |
| | 04_09-What We Covered.mp4 | 4.61 MB |
| | 05_01-What We Covered.mp4 | 9.88 MB |
| | digitalforensicstoolskalilinuximaginghashing.zip | 8.32 MB |
Description
Kali Linux (formerly BackTrack) is best known as the premier Linux distribution system for application and network penetration testers. Kali also includes many digital forensics tools that are useful for formal forensics investigations, solving problems in Information Technology, and learning about digital forensics. Professional digital forensic examiners, IT people, and students new to digital forensics will all find the information and demonstrations of the digital imaging and cryptographic hashing tools in this course very useful.
Sharing Widget
All Comments