ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

396 results

DFIRScience
DFS101: 1.1 Introduction to digital forensics

Welcome to the course - Introduction to digital forensics. This course assumes no prior knowledge of digital investigations or IT.

21:41
DFS101: 1.1 Introduction to digital forensics

192,308 views

5 years ago

DFIRScience
Forensic Data Acquisition - Hardware Write Blockers

This video introduces external write blockers used to prevent changes to suspect disks during data acquisition. A software or ...

8:00
Forensic Data Acquisition - Hardware Write Blockers

62,544 views

9 years ago

The Forensics Report with Lars Daniel
Cell Phone Forensic Data Extractions: What Attorneys Need to Know - or Risk Spoliation.

There are different types of data extractions that digital forensic experts can perform against cell phones and mobile devices, and ...

6:01
Cell Phone Forensic Data Extractions: What Attorneys Need to Know - or Risk Spoliation.

3,522 views

1 year ago

DEFCONConference
DEF CON 21 - Eric Robi and Michael Perklin - Forensic Fails Shift + Delete Won't Help You Here

Michael has spoken at security conferences internationally about a variety of topics including digital forensics, computer security, ...

47:10
DEF CON 21 - Eric Robi and Michael Perklin - Forensic Fails Shift + Delete Won't Help You Here

2,610 views

12 years ago

DFIRScience
DFS101: 1.2 Intro to Cybercrime and Networks

Digital forensic science lets us recover data and investigate digital devices. In this video, we talk about computer networks and ...

22:07
DFS101: 1.2 Intro to Cybercrime and Networks

52,226 views

5 years ago

UC Berkeley
Digital forensic expert breaks down political deepfakes | Academic Review

Every day someone asks Hany Farid, a UC Berkeley professor of electrical engineering and computer science and in the School ...

13:06
Digital forensic expert breaks down political deepfakes | Academic Review

6,743 views

1 year ago

Bristol Community College
STEM Seminar Series Preview - David Papargiris - Electronic Forensics

Prior to joining Evidox he spent he was the Director of the Computer Forensics Lab for the Massachusetts Attorney General's office ...

1:05
STEM Seminar Series Preview - David Papargiris - Electronic Forensics

79 views

11 years ago

DEFCONConference
DEF CON 23 - Gerard Laygui - Forensic Artifacts From a Pass the Hash Attack

A pass the hash (PtH) attack is one of the most devastating attacks to execute on the systems in a Windows domain. Many system ...

40:29
DEF CON 23 - Gerard Laygui - Forensic Artifacts From a Pass the Hash Attack

2,931 views

10 years ago

DFIRScience
DFS101: 5.1 Digital Investigation Definition

In this video, we describe the terms commonly used by digital investigators. Get started digital forensic science! Digital forensic ...

20:48
DFS101: 5.1 Digital Investigation Definition

8,029 views

5 years ago

Altsito
Debunking Cybersecurity Myths/Lies That PISS. ME. OFF.

Think your Mac is virus-free? Think Incognito Mode hides your ISP's view of you? Think again lol. BTW the malware sample ...

8:38
Debunking Cybersecurity Myths/Lies That PISS. ME. OFF.

105,370 views

3 weeks ago

DEFCONConference
DEF CON 23 - Sarah Edwards - Ubiquity Forensics: Your iCloud and You

Ubiquity or "Everything, Everywhere” - Apple uses this term describe iCloud related items and its availability across all devices.

44:34
DEF CON 23 - Sarah Edwards - Ubiquity Forensics: Your iCloud and You

4,188 views

10 years ago

The Expat Professor
Forensics foremost

Digital Forensics foremost !!!Thanks to Antiemes!!! "MZ is a common DOS binary header!!!" (Although this is not an actual binary ...

13:47
Forensics foremost

564 views

1 year ago

Lee Neubecker
What to look for in selecting a computer forensics expert witness

Data Diva Debbie Reynolds and Enigma Forensics' CEO Lee Neubecker discuss what to look for in selecting a computer ...

8:01
What to look for in selecting a computer forensics expert witness

67 views

6 years ago

Enigma Forensics, Inc.
Windows 7 Safety Issues

What are some of the potential problems for an organization that stays on Windows 7? Experts Lee Neubecker and Atahan ...

9:53
Windows 7 Safety Issues

23 views

5 years ago

Enigma Forensics, Inc.
Social Media and Cell Phone Forensics

Cyber Forensics Experts Lee Neubecker and Data Diva, Debbie Reynolds discuss the many techniques that can be applied to ...

8:23
Social Media and Cell Phone Forensics

18 views

5 years ago

Enigma Forensics, Inc.
Cell Phone Privacy: Naval Air Station Attack

Forensic experts, Lee Neubecker and Debbie Reynolds discuss the recent incident at the Naval Air Station in Pensacola.

8:29
Cell Phone Privacy: Naval Air Station Attack

12 views

5 years ago

Pour 1nfo - la Cyber expliquée
[TECH] Le point sur PETITPOTAM

Cet été, on a découvert PetitPotam, une attaque mal comprise, mal corrigée, mais surtout très importante et déjà utilisée par des ...

27:54
[TECH] Le point sur PETITPOTAM

2,586 views

4 years ago

Enigma Forensics, Inc.
Trade Secret Misappropriation - The role computer forensics plays in litigation.

Leading computer forensics Expert Lee Neubecker discusses trade secret theft by a departing employee and how that can lead to ...

9:39
Trade Secret Misappropriation - The role computer forensics plays in litigation.

134 views

6 years ago

NISGTC
Working Connections: Forensics

This work by the National Information Security and Geospatial Technologies Consortium (NISGTC), and except where otherwise ...

2:42
Working Connections: Forensics

34 views

12 years ago

DEFCONConference
DEF CON 21 - Michael Perklin - ACL Steganography Permissions to Hide Your Porn

Michael has spoken at security conferences internationally about a variety of topics including digital forensics, computer security, ...

44:48
DEF CON 21 - Michael Perklin - ACL Steganography Permissions to Hide Your Porn

5,464 views

12 years ago