How to Safely Access the Dark Web and Gather Information Securely
This guide provides essential tips on how to safely access the dark web and gather information while ensuring privacy and security

Malicious Document Analysis Walkthrough
This walkthrough guides you through the analysis of malicious documents using various tools and techniques.

Mastering TCPdump: A Comprehensive Guide to Network Traffic Analysis
Learn how to use TCPdump for capturing and analyzing network traffic with practical examples and advanced filtering techniques.

SOC L1 Alert Reporting
Learn how to properly report, escalate, and communicate about high-risk SOC alerts.

Memory Forensics Walkthrough
Using Volatility to Perform Memory Forensics and Extract Flags

Forensic Analysis of an Abandoned Hacker's Laptop
In this forensic walkthrough, we dive into a real-world scenario involving an abandoned Dell CPi notebook suspected of being used for wireless hacking activities. Using a multi-part disk image, we uncover traces of hacking tools, analyze usage artifacts, and attempt to link the digital evidence to the alleged hacker known as 'Mr. Evil.' Join me as we explore how digital forensics helps trace the footsteps of a cyber intruder and piece together their digital trail

Digital Forensics Case B4DM755
Acquire the critical skills of evidence preservation, disk imaging, and artefact analysis for use in court.
