Overview
Dive into the world of forensic computing with this comprehensive first part of a two-part lecture series. Learn about basic procedures, collection phase, data preservation, and various data hiding techniques including obfuscation, steganography, and covert channels. Explore IP TCP cover channels, DNS cover channels, and HTTP cover channels. Gain insights into network traffic analysis, including Sun flag, DNS activity, MAC address, and broadcasts. Access additional resources and the second part of the lecture through provided links to enhance your understanding of forensic computing principles and practices.
Syllabus
Intro
Basic Procedures
Collection Phase
Data Preservation
Data Hiding
Obfuscation
stenography
covert channels
IP TCP cover channels
DNS cover channels
HTTP cover channels
Network traffic
Sun flag
DNS activity
MAC address
Broadcasts
Taught by
Bill Buchanan OBE