Distributors may purchase multiple copies of packages to distribute to learners, and follow their progress. Bulk discounts are below.
Quantity | Price per voucher |
---|---|
1+ | $0.00 |
Monday, September 28, 2020 | 05:07:18 |
Welcome & Opening Remarks | 00:15:10 | |
Law Enforcement Operations at Uber | 00:55:26 | |
When Cyber Criminals Go Back To Their Roots: Inventory Theft Through L2 Hacking | 00:45:55 | |
The Cat and Mouse Game with iOS Forensics | 00:50:46 | |
Today's Digital Investigations Using Artificial Intelligence | 00:37:15 | |
Forensics in the Corporate Cloud | 00:57:28 | |
Exposing Bluetooth Low Energy (BLE) and BLE Mesh Threats to Law Enforcement and Unsuspecting Targets | 00:45:18 |
Tuesday, September 29, 2020 | 09:43:09 |
Analyzing WiFi Connections | 00:42:37 | |
Arizona Department of Public Safety's Facial Recognition Section | 01:02:00 | |
GPS Investigations: An IoT Primer | 00:47:32 | |
"Cyber Sleuthing" - Investigation Resources | 00:55:24 | |
Opening - SIM Swap – Investigations, Scope, & Impact | 00:43:18 | |
Emerging Data Types in eDiscovery & Forensics | 01:04:00 | |
Drones and the Fourth Amendment | 00:46:23 | |
Hacking Your Way Into Security! | 01:01:25 | |
Broken Arrow | 00:59:50 | |
The Beginners Guide To Modern Mobile Device Extraction | 00:42:46 | |
Media Cache: A Hidden Vault of Evidence in Seagate Hard Disk Drives | 00:57:54 |
Wednesday, September 30, 2020 | 08:48:37 |
Advanced Chip-Off Forensics | 00:50:00 | |
Cell Site Analysis and Data Validation: Bringing the Digital Environment to Justice | 01:17:00 | |
Phone Forensics to the Edge of Possibilities in 2020 - From Software Hacking to Chip-Off | 00:53:48 | |
Analyzing USB Connections | 00:49:16 | |
Forensic Investigation of Emails Altered on The Server | 00:57:06 | |
Forensic Artifacts and Techniques that are Essential for Mac Investigations | 00:52:28 | |
Identifying a Fraud Network from a Single Website or Email Address | 00:51:37 | |
Why We are Losing the War on Cyber Crime | 00:37:22 | |
Search and Seizure in the Digital Realm | 00:53:06 | |
Amazon Web Services as a Digital Crime Scene Location | 00:46:54 |
Thursday, October 1, 2020 | 06:44:42 |
The Psychology Behind Computer Forensic Reporting and What Everyone Misses | 00:45:50 | |
Application Fraud Insights - Case Studies on Automation and Manual Click Farms | 00:53:02 | |
Intro to Griffeye Analyze DI | 00:51:46 | |
CyberTech Girls & GenCyber Girls - Digital Forensics for Kids | 00:30:08 | |
Microsoft 365 and OneDrive Forensic Update | 01:03:58 | |
How Was that Breach Detected? | 00:45:28 | |
Analyzing Video Evidence: Common Errors in Interpretation | 00:57:18 | |
Blurred lines on Resilience - Visualizing the Cyber Security Battlefield | 00:57:12 |
Friday, October 2, 2020 | 06:48:01 |
TikTok, Telegram, and Other Social Media OSINT Investigations | 00:38:48 | |
The Intersection of Privacy & Security | 00:52:28 | |
Digital Evidence from Social Networking Sites & Smartphone Apps | 00:52:47 | |
Mostly Cloud with a Chance of Fog | 00:56:58 | |
Checkm8 Checkra1n and Beyond - iOS Full FileSystem | 00:49:22 | |
DeepFake Forensics Investigations | 00:49:32 | |
What if an App is Not Supported? | 00:46:45 | |
Creating VM’s from Forensic Images for Courtroom Presentation | 01:01:21 |
Vendor Showcase Section | 03:56:55 |
Belkasoft Vendor Showcase 9/28 | 00:30:52 | |
Skopenow Vendor Showcase 9/29 | 00:19:34 | |
Grayshift Vendor Showcase 9/30 | 00:19:48 | |
DME Forensics Vendor Showcase 9/30 | 00:14:50 | |
OpenText Vendor Showcase 10/1 | 00:22:58 | |
Susteen Vendor Showcase 10/1 | 00:22:13 | |
Belkasoft Vendor Showcase 9/30 | 00:26:45 | |
Susteen Vendor Showcase #2 10/1 | 00:13:12 | |
Skopenow Vendor Showcase 10/1 | 00:16:40 | |
Belkasoft Vendor Showcase 10/1 | 00:37:15 | |
DeSales University Vendor Showcase | 00:12:48 |