Computer forensics I have seen many students and many of you youtube visitors who want to learn computer forensics and want to take computer forensics degree so for them here are the list of the best websites and online computer forensics courses. With the help of these websites and courses you can register yourself and take computer forensics degree and you can also learn from them with the great tutorial videos and content provided for computer forensic training.
Online Computer Forensics Courses are as follows :-
Basic Steps in Forensic Analysis of Unix Systems at the University of Washington
Through this web tutorial it instructs learners on forensic analysis of computer machines which are running on the Unix operating system. It gives you step by step guide on analysis and includes graphics, illustrations and references. The tutorials includes sample Unix scripts and protocols. Also it includes the materials demonstrate how to run analysis using standard Unix tools, specifically the coroner’s toolkit (TCT), It includes the specialized programs grave-robber, unrm, lazarus and mactime. No other course materials are available, although students are expected to have access to Unix workstation.
Cryptography and Cryptanalysis at Massachusetts Institute of Technology (MIT)
Students who are comfortable with elementary number theory, algorithms and discrete probability can use these graduate course materials on introductory cryptography and cryptanalysis. Problem sets, study materials and a template for completing problem assignments can also be downloaded; however, course readings may need to be purchased.
Emerging Security Vulnerabilities & the Impact to Business through YouTube
This informational video examines what information technology professionals and Web programmers need to know about security, what security is needed and how to implement appropriate security. The web video examines the most common security vulnerabilities, as well as which software programs are most vulnerable. It also focuses on specific cyber-attacks like SQL injection and XSRF (Cross Site Request Forgery). It also included various types of security education available today.
Introduction to Computer Forensics and Investigations at The Open University
This is an introductory course which covers general principles of computer forensics and how these are used in day to day and in public/private spheres. Lessons include how to locate passwords and use the Windows File Analyzer to examine files, shortcuts, the Internet cache and the recycle bin on a machine running a Windows operating system. It provides activity assignments with transcripts, videos and screen snapshots.
Intrusion Detection System at Korea University
In this class it covers traditional types of intrusion and detection methods. Lecture materials are available for download and explore geospatial and physical intrusion detection, the lifecycle of vulnerability, visual data communications and Web application firewalls. Students can also access an assigned project; however, there isn’t any opportunity for collaboration with or feedback from fellow learners or instructors. Reading assignments are also available, although students need to obtain the texts independently.
Living with the Internet: Keeping it Safe at The Open University
This free online course teaches computer users how to identify and prevent computer crashes and cyber threats. Students learn the difference between viruses, trojans and worms. Other topics explored include email attachments, antivirus software, firewalls, hijackers and malware.
Network and Computer Security at MIT
This undergraduate/graduate course teaches students the importance of a secure computer and network system, software protection and electronic commerce. Students learn through assignments and exams with solutions. The site also offers recommended reading. Topics covered include cryptography, authentication, firewalls, risk assessment, electronic mail, viruses and intrusion detection.
Network Security at The Open University
This graduate-level course provides users with the information necessary to ensure a computer network is free from cyber attacks and security threats. Students investigate the meanings of vulnerability, threats and attacks. The course focuses on identifying computer/Internet threats and implementing appropriate security and firewalls. Authentication certification is also covered.
This free online course focuses on specific areas of cryptography and the role it plays in our daily lives. Students learn to identify various cryptographic procedures available and choose appropriate methods based on the type of network system. The course offers a section on electronic voting systems and ways of making them secure. Students have access to various lecture notes.