HOME > Development > Python Digital Forensics

Python Digital Forensics

  • Development
  • Mar 11, 2025
SynopsisPython Digital Forensics, available at $34.99, has an average...
Python Digital Forensics  No.1

Python Digital Forensics, available at $34.99, has an average rating of 4.1, with 22 lectures, based on 32 reviews, and has 449 subscribers.

You will learn about Think like an attacker and solve forensics issues with more efficiently Learn network forensics to drive your host analysis Investigate with the utmost efficiency in Windows and GNU/Linux environments Learn advanced data-viewing topics in file analysis Get the best tools to obtain and analyze volatile memory images Use Python to complete enumeration, exploitation, and data exfiltration This course is ideal for individuals who are If you are a practitioner, security professional, or someone who just wants to know about digital forensics, then this course is for you. You will learn new and innovative ways of solving common forensics tasks and upgrade your experience with Python. It is particularly useful for If you are a practitioner, security professional, or someone who just wants to know about digital forensics, then this course is for you. You will learn new and innovative ways of solving common forensics tasks and upgrade your experience with Python.

Enroll now: Python Digital Forensics

Summary

Title: Python Digital Forensics

Price: $34.99

Average Rating: 4.1

Number of Lectures: 22

Number of Published Lectures: 22

Number of Curriculum Items: 22

Number of Published Curriculum Objects: 22

Original Price: $109.99

Quality Status: approved

Status: Live

What You Will Learn

  • Think like an attacker and solve forensics issues with more efficiently
  • Learn network forensics to drive your host analysis
  • Investigate with the utmost efficiency in Windows and GNU/Linux environments
  • Learn advanced data-viewing topics in file analysis
  • Get the best tools to obtain and analyze volatile memory images
  • Use Python to complete enumeration, exploitation, and data exfiltration
  • Who Should Attend

  • If you are a practitioner, security professional, or someone who just wants to know about digital forensics, then this course is for you. You will learn new and innovative ways of solving common forensics tasks and upgrade your experience with Python.
  • Target Audiences

  • If you are a practitioner, security professional, or someone who just wants to know about digital forensics, then this course is for you. You will learn new and innovative ways of solving common forensics tasks and upgrade your experience with Python.
  • Python is uniquely positioned as a programming language to perform cyber investigations and perform forensics analysis. Unleash the power of Python by using popular libraries and Python tools to help you create efficient and thorough forensics investigations. This course will walk you through digital forensics on network traffic, host analysis, and memory analysis.

    The course starts with network forensics, an important aspect of any investigation. You will learn to read, sort, and sniff raw packets and also analyze network traffic. These techniques will help you drive your host analysis. You will learn about tools you’ll need to perform a complete investigation with the utmost efficiency in both Windows and GNU/Linux environments with Python. Next, you will learn more advanced topics such as viewing data in PE and ELF binaries. It’s vital to analyze volatile memory during an investigation as it provides details about what is actually running on a given system. So, you will learn the best tools to obtain and analyze volatile memory images. Finally, you will learn how to use Python in order to think like an attacker. You will complete enumeration, exploitation, and data exfiltration.

    By the end of the course, you will be able to make the most of Python processes and tackle varied, challenging, forensics-related problems. So, grab this course and think like an attacker!

    About the Author

    Daryl Bennett is a manager of a Cyberspace Threat Emulation team with the United States Air Force, where he leads military and civilian members in the employment and execution of offensive security on order to audit the security of network infrastructures. He is a key operator, focusing on risk analysis and the overall security posture of cyberspace systems. Additionally, he has 5+ years’ experience working in the open-source community. He is a development specialist in a wide range of domains, including GNU/Linux applications, Android mobile, and autonomous systems. He is passionate about sustaining, developing, and implementing both current and new technologies, while practicing analytical problem-solving and learning as much as possible in the process.

    Course Curriculum

    Chapter 1: Python for Network Forensics

    Lecture 1: The Course Overview

    Lecture 2: Learning Dshell

    Lecture 3: Working with Scapy

    Lecture 4: Importing Scapy Modules

    Lecture 5: Introduction to Impacket

    Chapter 2: Windows

    Lecture 1: Enumerating Directories

    Lecture 2: Populating File Properties

    Lecture 3: Querying the Registry

    Lecture 4: Exploring Portable Executables

    Chapter 3: GNU/Linux Forensics

    Lecture 1: Enumerating Directories

    Lecture 2: Exploring File Properties

    Lecture 3: Deeper File Properties

    Lecture 4: Parsing System Logs

    Lecture 5: Reading the Journal

    Chapter 4: Memory Forensics

    Lecture 1: Analyzing Windows Memory

    Lecture 2: Capturing Linux Memory

    Lecture 3: Analyzing Linux Memory

    Chapter 5: Threat Emulation

    Lecture 1: Enumeration

    Lecture 2: Port Enumeration

    Lecture 3: Exploitation

    Lecture 4: Post Enumeration

    Lecture 5: Data Exfiltration

    Instructors

  • Python Digital Forensics  No.2
    Packt Publishing
    Tech Knowledge in Motion
  • Rating Distribution

  • 1 stars: 0 votes
  • 2 stars: 1 votes
  • 3 stars: 7 votes
  • 4 stars: 9 votes
  • 5 stars: 15 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!