Forensic Computing - Procedures, Data Preservation, and Covert Channels - Part 1

Forensic Computing - Procedures, Data Preservation, and Covert Channels - Part 1

Bill Buchanan OBE via YouTube Direct link

JPEG

11 of 20

11 of 20

JPEG

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Forensic Computing - Procedures, Data Preservation, and Covert Channels - Part 1

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Basic Procedures
  3. 3 Collection Phase
  4. 4 Data Preservation
  5. 5 Data Hiding
  6. 6 Obfuscation
  7. 7 Changing File Names
  8. 8 Deleted Files
  9. 9 Metadata
  10. 10 stenography
  11. 11 JPEG
  12. 12 Covert Channels
  13. 13 IP TCP Covert Channels
  14. 14 DNS Covert Channels
  15. 15 HTTP Covert Channels
  16. 16 Network Traffic
  17. 17 Sun Flag
  18. 18 DNS Activity
  19. 19 MAC Address
  20. 20 Broadcasts

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.