All in One Offer! | Access Unlimited Courses in any category starting at just $29. Signup today. Offer Ends in: 6 Days!

Browse Library

Get Unlimited Learning Access
$29
6 days left at this price!
30-Day Money-Back Guarantee

It Includes

  • Get Full Access to the platform
  • Access to 16000+ online courses
  • Play & Pause Course Viewing
  • Attend weekly live webinar
  • High Quality Recorded Lectures
  • Learn Online from Mobile/PC/Tablet
  • Assignments & Projects
  • Online iLab Access
  • Certificate of Completion
  • Download for offline viewing
  • Cancel Anytime
$29
  • How to Setup Practice Labs.
  • How to Install Required Apps & Tools.
  • How to Capture Network Traffic Packets using Wireshark.
  • How to Analyze Wireshark Captured Packets.
  • How to Recover Deleted Files from OS/Partition/Devices.
  • Linux Forensic Investigation.
  • Windows Forensic Investigation.
  • Malware Analysis and Performing Reverse Engineering on Malwares.
  • Handling Linux and Windows Important Inbuilt Tools.
  • Perform Cyber Forensic Investigation with Practical Methods.
  • Finding Malicious Processes on Windows & Linux.
  • Terminating Malicious Processes on Windows & Linux.
  • Analyzing Windows Security Logs.
  • Linux File Transfer using Command Line.
  • Setting up Netcat Listener to Get Reverse Connection Access.
  • File Transfer using Netcat Listener and SimpleHTTP server.

Cyber Security Analyst (CSA) - Cyber Forensic Investigator

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Welcome to the "Cyber Security Analyst (CSA) - Cyber Forensic Investigator" course. This course is developed for security analysts who are beginners in cybersecurity. This is a fully practical course where I have explained everything from setting up the lab to perform security audits on live machines. If you have purchased our course then we are going to upload regular new content in this course so in the future you will get access to that content free of cost we are taking steps to stop piracy of this course. This course is for educational purposes only, do not try methods you learned in this course for any unethical activity.

 

What you will learn in this course?

  • How to Setup Practice Labs.

  • How to Install Required Apps & Tools.

  • How to Capture Network Traffic Packets using Wireshark.

  • How to Analyze Wireshark Captured Packets.

  • How to Recover Deleted Files from OS/Partition/Devices.

  • Linux Forensic Investigation.

  • Windows Forensic Investigation.

  • Malware Analysis and Performing Reverse Engineering on Malwares.

  • Handling Linux and Windows Important Inbuilt Tools.

  • Perform Cyber Forensic Investigation with Practical Methods.

  • Finding Malicious Processes on Windows & Linux.

  • Terminating Malicious Processes on Windows & Linux.

  • Analyzing Windows Security Logs.

  • Linux File Transfer using Command-Line.

  • Setting up Netcat Listener to Get Reverse Connection Access.

  • File Transfer using Netcat Listener and SimpleHTTP server.

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Disclaimer: All videos and tutorials are for informational and educational purposes only. We believe that ethical hacking, information security, and cybersecurity should be familiar subjects to anyone using digital information and computers.

  • Be able to learn basic OS concept.
  • Be able to learn basic Networking concept.
  • Be able to learn basic cybersecurity concept.
  • There are no course requirements or prerequisites this course is designed for those who wants to start their career in cyber security.
  • Beginner into Cyber Security.
  • Organizations to improve cybersecurity awareness in their employees.
  • Beginner in Cyber Forensic Investigation.
  • Beginner in OS Forensic.
  • Beginner in Linux Forensic Investigation.
  • Beginner in Windows Forensic Investigation.
  • Beginner in Malware Analysis.
  • Beginner in System Recovery.
View More...
  • Section 1 : 01 Introduction 1 Lectures

    • Lecture 1 :
    • 01.01 Course Introduction Preview
  • Section 2 : 02 Lab Setup & Installation 6 Lectures 00:20:59

    • Lecture 1 :
    • 02.01 Installing Kali Linux on VMware workstation
    • Lecture 2 :
    • 02.02 Launching Kali Instance on AWS EC2
    • Lecture 3 :
    • 02.03 Installing Ghidra Tool on Kali Linux
    • Lecture 4 :
    • 02.04 Installing Wireshark on Kali Linux
    • Lecture 5 :
    • 02.05 Create Linux OS Image Backup
    • Lecture 6 :
    • 02.06 Create Windows OS Image Backup
  • Section 3 : 03 OS Basics 7 Lectures 00:10:02

    • Lecture 1 :
    • 03.01 Analyzing and Terminating Windows Processes
    • Lecture 2 :
    • 03.02 Analyzing and Terminating Linux Processes
    • Lecture 3 :
    • 03.03 Analyzing Windows Scheduled Tasks
    • Lecture 4 :
    • 03.04 Analyzing Linux Scheduled Tasks
    • Lecture 5 :
    • 03.05 Modifying Local DNS File on Windows
    • Lecture 6 :
    • 03.06 Modifying Local DNS File on Linux
    • Lecture 7 :
    • 03.07 Analyzing Event Logs on Windows
  • Section 4 : 04 WireShark Tutorial 6 Lectures 00:39:22

    • Lecture 1 :
    • 04.01 Capturing Packets on Wireshark
    • Lecture 2 :
    • 04.02 Analyzing pcap file on H4CKED Machine Part 1
    • Lecture 3 :
    • 04.03 Analyzing pcap file on H4CKED Machine Part 2
    • Lecture 4 :
    • 04.04 Analyzing hacked Overpass Machine using pcap file - Part 1
    • Lecture 5 :
    • 04.05 Analyzing hacked Overpass Machine using pcap file - Part 2
    • Lecture 6 :
    • 04.06 Analyzing hacked Overpass Machine using pcap file - Part 3
  • Section 5 : 05 File Recovery 4 Lectures 00:07:09

    • Lecture 1 :
    • 05.01 Installing & Getting Help - Foremost
    • Lecture 2 :
    • 05.02 Installing & Getting Started with - Recoverjpeg
    • Lecture 3 :
    • 05.03 Recovering Files using Foremost
    • Lecture 4 :
    • 05.04 Recovering Files using Recoverjpeg
  • Section 6 : 06 Linux Forensic Investigation 3 Lectures 00:06:49

    • Lecture 1 :
    • 06.01 Linux Forensic Investigation Part 1
    • Lecture 2 :
    • 06.02 Linux Forensic Investigation Part 2
    • Lecture 3 :
    • 06.03 Linux Forensic Investigation Part 3
  • Section 7 : 07 Windows Forensic Investigation 4 Lectures 00:04:40

    • Lecture 1 :
    • 07.01 Windows Forensic Investigation Part 1 wRONg
    • Lecture 2 :
    • 07.02 Windows Forensic Investigation Part 2
    • Lecture 3 :
    • 07.03 Windows Forensic Investigation Part 3
    • Lecture 4 :
    • 07.04 Windows Forensic Investigation Part 4
  • Section 8 : 08 Malware Analysis 5 Lectures 00:10:47

    • Lecture 1 :
    • 08.01 Removing Malware and Recovering Machine Part 1
    • Lecture 2 :
    • 08.02 Removing Malware and Recovering Machine Part 2
    • Lecture 3 :
    • 08.03 Reverse Engineering Malware Part 1
    • Lecture 4 :
    • 08.04 Reverse Engineering Malware Part 2
    • Lecture 5 :
    • 08.05 Reverse Engineering Malware Part 3
  • How do i access the course after purchase?

    It's simple. When you sign up, you'll immediately have unlimited viewing of thousands of expert courses, paths to guide your learning, tools to measure your skills and hands-on resources like exercise files. There’s no limit on what you can learn and you can cancel at any time.
  • Are these video based online self-learning courses?

    Yes. All of the courses comes with online video based lectures created by certified instructors. Instructors have crafted these courses with a blend of high quality interactive videos, lectures, quizzes & real world projects to give you an indepth knowledge about the topic.
  • Can i play & pause the course as per my convenience?

    Yes absolutely & thats one of the advantage of self-paced courses. You can anytime pause or resume the course & come back & forth from one lecture to another lecture, play the videos mulitple times & so on.
  • How do i contact the instructor for any doubts or questions?

    Most of these courses have general questions & answers already covered within the course lectures. However, if you need any further help from the instructor, you can use the inbuilt Chat with Instructor option to send a message to an instructor & they will reply you within 24 hours. You can ask as many questions as you want.
  • Do i need a pc to access the course or can i do it on mobile & tablet as well?

    Brilliant question? Isn't it? You can access the courses on any device like PC, Mobile, Tablet & even on a smart tv. For mobile & a tablet you can download the Learnfly android or an iOS app. If mobile app is not available in your country, you can access the course directly by visting our website, its fully mobile friendly.
  • Do i get any certificate for the courses?

    Yes. Once you complete any course on our platform along with provided assessments by the instructor, you will be eligble to get certificate of course completion.
  • For how long can i access my course on the platform?

    You require an active subscription to access courses on our platform. If your subscription is active, you can access any course on our platform with no restrictions.
  • Is there any free trial?

    Currently, we do not offer any free trial.
  • Can i cancel anytime?

    Yes, you can cancel your subscription at any time. Your subscription will auto-renew until you cancel, but why would you want to?

Shubham Kotwal,

Founder of Infinity Digital Technologies. Completed global certifications like Red Hat Certified System Administrator(RHCSA), Red Hat Certified Engineer(RHCE). Shubham is Graduated in a Bachelor of Computer Science. He started his Instructor journey in march 2021 and till now he trained more than 60k+ students globally. Shubham having experience in handling and managing multiple technologies like Penetration Testing, Ethical Hacking, Bug Bounty Hunting, Search Engine Optimization, Digital Marketing, Android Development, WordPress Development, AWS Cloud, etc... His goal is to train more than 100k+ students by end of this year.
View More...
  • learn-nxtgen-hacking-with-technology

    Learn NxtGen Hacking with Technolog...

    By : Gopikrishna C

    Lecture 80 Beginner Level 8:29:27
  • tcp-ip-the-complete-course

    TCP/IP: The Complete Course

    By : Lazaro (Laz) Diaz

    Lecture 17 Beginner Level 1:52:18
  • voip-configuration-and-attacking-hacking

    VoIP Configuration and Attacking (H...

    By : Arpit Mittal

    Lecture 6 Beginner Level 0:10:40
  • cissp-certification-introduction

    CISSP- Certification Introduction

    By : MUKESH SINGH

    Lecture 18 Intermediate Level 2:4:20
  • practical-blockchain-smart-contracts-ethereum-solidity

    Practical Blockchain & Smart Contra...

    By : Abhilash Nelson

    Lecture 40 Beginner Level 4:56:0
  • complete-ethical-hacking-penetration-testing-for-web-apps

    Complete Ethical Hacking & Penetrat...

    By : Abhilash Nelson

    Lecture 30 Beginner Level 3:28:56
Signup & Continue Checkout
By signing up, you agree to our Terms of Use and Privacy Policy
Create New Password
Enter your email address and we'll send you a link to reset your password.