DFS101: Intro to Digital Forensic Science

DFS 2.1 Cybersecurity

Get started digital forensic science! Digital forensic science lets us recover data and investigate digital devices.

DFS 2.2 How hackers hack

Get started digital forensic science! Digital forensic science lets us recover data and investigate digital devices.

DFS 3.1 Intro to Computers

In this video, we introduce you to the main components of a computer system. The inside of a computer seems complicated, but just understanding the main comp...

DFS 3.1 Intro to Computers II

In this video, we introduce you to the main components of a computer system. The inside of a computer seems complicated, but just understanding the main comp...

DFS 3.2 Introduction to Network Analysis

In this video, we discuss how to collect and analyze data from a computer network (network traffic). Network traffic is a great source of information for inv...

DFS 3.3 Password attacks

In this video, we discuss password attacks and password cracking. This is to show how easy it is for an attacker to guess a large number of passwords with mo...

DFS 4.3 Electronic Evidence

In this video, we discuss fundamental concepts of digital evidence that will be used throughout the remainder of the course. Digital evidence is complicated ...

DFS 6.1 Data Storage

In this video, we show how data is stored and accessed on digital storage devices.

DFS 6.2 Data Structures

In this video, we talk about data structures. Specifically, how to understand what data means based on the structure it has. We introduce ways that forensic ...

DFS 6.3 Data Acquisition

In this video, we talk about the theory behind the forensic acquisition of data. Specifically, things to think about when starting to create a forensic image...

DFS 7.1 How data can be recovered

In this video, we talk about the theory of data recovery, how data structures are detected, and how these data structures are extracted from suspect data suc...

DFS 7.2 Data recovery with Photorec

In this video, we show how to use Photorec from the Windows Command Line to recover files (not just photos) from a target USB stick.

DFS 9.1 Types of hacking

In this video, we discuss the different types of hackers, their motivations, goals, and techniques that they tend to use. All hackers are different, but ther...

DFS 9.2 Malware

In this video, we discuss the different types of malware that exist, how they infect systems, and what their particular goals are.

DFS 9.3 Social Engineering

In this video, we discuss social engineering techniques, and how social engineering is used to gain information useful to cybercrime investigations.

DFS 10.1 RAM Acquisition and Analysis

In this video, we discuss Random Access Memory (RAM). Specifically, what RAM is, how RAM works, and why it is important for digital investigations.

DFS 11.1 Mobile Device Investigations

This video will look at the many types of mobile devices, and what types of investigation-relevant information are available on these devices. Hands-on demon...