Digital Forensics with Kali Linux

3 Reviews
383 Enrolled
You save 91% -
  • Installation and Setup
    The Course Overview4:16
    Brief Introduction to Digital Forensics6:35
    Downloading and Installing Kali Linux6:25
  • Acquiring Forensic Images
    Introduction to Forensic Imaging11:08
    Overview of dcfldd and dc3dd5:02
    Drive Imaging with dc3dd9:03
    Android Device Imaging with dc3dd12:47
    Image Acquisition with Guymager5:15
  • Artifacts Extraction and Analysis with CLI Tools
    Overview of the Sleuth Kit and Filesystem Analysis13:15
    Windows Registry Analysis with RegRipper9:26
    Extracting and Analyzing Browser, E-mail, and IM Artifacts13:41
    File Analysis Tools14:30
    Building a Super-Timeline of the Events10:51
  • File Carving and Data Recovery
    File Carving Overview7:07
    File Carving Tools8:37
    Extracting Data with Bulk Extractor5:04
  • The Autopsy Forensic Suite
    Autopsy 4 Overview and Installation5:13
    Analysis of a Windows Image with Autopsy10:47
    Analysis of an Android Image with Autopsy4:55
  • Memory Forensics
    Introduction to Memory Forensics and Acquisition4:03
    Memory Acquisition4:07
    Introduction to Volatility3:11
    Memory Analysis with Volatility4:25
  • Network Forensics
    Introduction to Network Forensics5:07
    Capturing Network Traffic with Wireshark6:33
    Network Traffic Analysis with Wireshark4:17
  • Reporting
    Introduction to Reporting3:34
    Documentation and Reporting Tools5:12

Simplify the Art of Digital Forensics & Analysis with Kali Linux

Packt Publishing

Marco Alamanni has professional experience working as a Linux system administrator and Information Security analyst in banks and financial institutions.

He holds a BSc in Computer Science and an MSc in Information Security. His interests in information technology include ethical hacking, digital forensics, malware analysis, Linux, and programming, among other things. He also collaborates with IT magazines to write articles about Linux and IT security.

He has used Kali Linux on various occasions to conduct incident response and forensics in his professional activity, besides using it for penetration testing purposes. He is also the author of “Kali Linux Wireless Penetration Testing Essentials” published by Packt Publishing.


Kali Linux is the most comprehensive distribution for penetration testing and ethical hacking. This course teaches you all about the forensic analysis of computer and mobile devices that leverage the Kali Linux distribution. You'll get hands-on, seeing how to conduct each phase of the digital forensics process: acquisition, extraction, analysis, and presentation.

  • Learn how to use each tool to acquire images from the media to be analyzed
  • Discuss the Autopsy forensic suite & other specialized tools
  • Anaylze an Android device image using Autopsy
  • Cover file carving & the recovery of deleted data


Details & Requirements

  • Length of access: lifetime
  • Access options: download for offline access
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels


  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.
Your cart is empty. Continue Shopping!
Processing order...