Advanced Cloud and Network Forensics | Digital Forensics, Information Security

Edinburgh Napier

Comprehensive course on advanced cloud and network forensics, covering malware analysis, SIEM, and data loss prevention. Taught by experienced instructor Bill Buchanan from Edinburgh Napier University.

University CoursesCloud ComputingNetwork SecuritySecurity

Introduction

The aim of this module is to provide an in-depth understanding of complex information infrastructures. It covers topics such as risk, malware analysis, network forensics, SIEM/advanced log analysis, cloud computing, and data loss prevention.

screenshot

Highlights

  • Comprehensive coverage of advanced cloud and network forensics
  • Hands-on lab exercises to reinforce learning
  • Covers a wide range of relevant topics, including malware analysis, network forensics, and cloud computing
  • Taught by an experienced instructor, Bill Buchanan, from Edinburgh Napier University

Recommendation

This course is recommended for students and professionals interested in developing advanced skills in cloud and network forensics. It provides a deep dive into the technical aspects of these domains and is suitable for those looking to enhance their expertise in information security and digital forensics.

How GetVM Works

Learn by Doing from Your Browser Sidebar

Access from Browser Sidebar

Access from Browser Sidebar

Simply install the browser extension and click to launch GetVM directly from your sidebar.

Select Your Playground

Select Your Playground

Choose your OS, IDE, or app from our playground library and launch it instantly.

Learn and Practice Side-by-Side

Learn and Practice Side-by-Side

Practice within the VM while following tutorials or videos side-by-side. Save your work with Pro for easy continuity.

Explore Similar Hands-on Tutorials

Building Serverless Applications with Google Cloud Run

8
Technical TutorialsCloud Computing
Comprehensive guide to developing serverless apps on Google Cloud Run. Covers architecture, deployment, and leveraging Google Cloud services.

How to optimize storage costs using Amazon S3

1
Technical TutorialsCloud Computing
Optimize storage costs using Amazon S3 and gain valuable business insights at lower cost. Understand the 4 pillars of S3 cost optimization and leverage S3 features to monitor, analyze, and manage storage.

Learn Azure in a Month of Lunches

23
Technical TutorialsCloud Computing
Practical guide to learning Microsoft Azure, covering cloud computing, infrastructure, and deployment strategies. Suitable for beginners and experienced users.

Cryptography: Secure Communication & Data Protection

10
Technical TutorialsSecurity
Comprehensive guide to cryptographic principles, encryption techniques, and information security. Explore the history, evolution, and practical applications of cryptography.

Gray Hat Hacking: The Ethical Hackers Handbook

4
Technical TutorialsCybersecuritySecurity
Comprehensive guide covering ethical hacking, cybersecurity, and gray hat hacking techniques. Suitable for beginners and experienced professionals.

Practical Cryptography for Developer

20
Technical TutorialsCryptographyPythonSecurity
Comprehensive guide to cryptography, blockchain, and security for developers. Learn practical techniques, algorithms, and best practices for implementing secure applications.

Programming Differential Privacy

21
Technical TutorialsPythonSecurity
Comprehensive guide to programming differential privacy, using Python examples and interactive chapters. Suitable for computer science undergraduates.

The Joy of Cryptography (2021)

8
Technical TutorialsCryptographySecurity
Comprehensive guide to modern cryptography, covering fundamentals of provable security, secure composition of cryptographic building blocks, and a solid theoretical foundation.

Kali Linux 2018: Assuring Security by Penetration Testing, Fourth Edition

15
Technical TutorialsKali LinuxSecurity
Comprehensive guide to Kali Linux, the most popular open-source penetration testing distribution. Master the latest version and the most useful tools for penetration testing.