Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Computer Forensics Podcasts

show episodes
 
Artwork

1
Digital Forensics Now

Heather Charpentier & Alexis "Brigs" Brignoni

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A podcast by digital forensics examiners for digital forensics examiners. Hear about the latest news in digital forensics and learn from researcher interviews with field memes sprinkled in.
  continue reading
 
Artwork

1
Forensic Focus

Forensic Focus: Digital Forensics, Incident Response, DFIR

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Digital forensics discussion for computer forensics, DFIR and eDiscovery professionals. Visit Forensic Focus at forensicfocus.com for more.
  continue reading
 
Artwork

1
F for Forensics

Ben & Alex

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to F for Forensics — the ultimate digital forensic podcast for cybersecurity professionals, investigators, and tech sleuths! Hosted by Ben and Alex, each episode explores the tools, techniques, and real-world cases behind computer forensics, file system analysis, data recovery, incident response, and more. Whether you're into NTFS carving, malware artifacts, or forensic imaging, this is your byte-sized boost of expert insight and geeky banter. Subscribe now for deep dives into digita ...
  continue reading
 
Artwork
 
Join Defense Forensic's Rob Walensky in this week's episode of "Digital Forensics, Redefined." As a 20-year veteran of law enforcement, Rob has seen it all, from near-death experiences with alligators to nationwide drug busts. Using digital forensics, he solved thousands of cases and still attends court for hundreds more. The life of a law enforcement agent never stops. Tune in each week as he brings on guests to discuss more of their digital forensic findings while reminiscing on past lives ...
  continue reading
 
Artwork

1
Digital Detectives

Legal Talk Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Digital Detectives. We'll discuss computer forensics, electronic discovery and information security issues and what's really happening in the trenches. It's not theory, but practical information that you can use in your law practice on the Legal Talk Network.
  continue reading
 
"The Edge AIsle" brings you to the forefront of artificial intelligence and edge computing, powered by Hailo.ai. In this podcast, we explore how edge AI is reshaping industries from smart cities and intelligent video analytics to autonomous vehicles and retail innovation. Join industry experts and thought leaders as they share insights into how Hailo’s AI processors are transforming the way industries function, enabling real-time deep learning and AI-driven applications directly on edge devi ...
  continue reading
 
Artwork

1
Digital Pathology Podcast

Aleksandra Zuraw, DVM, PhD

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Aleksandra Zuraw from Digital Pathology Place discusses digital pathology from the basic concepts to the newest developments, including image analysis and artificial intelligence. She reviews scientific literature and together with her guests discusses the current industry and research digital pathology trends.
  continue reading
 
Artwork

1
Lost Women of Science

Lost Women of Science

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
For every Marie Curie or Rosalind Franklin whose story has been told, hundreds of female scientists remain unknown to the public at large. In this series, we illuminate the lives and work of a diverse array of groundbreaking scientists who, because of time, place and gender, have gone largely unrecognized. Each season we focus on a different scientist, putting her narrative into context, explaining not just the science but also the social and historical conditions in which she lived and work ...
  continue reading
 
Artwork

1
CyberSecurity Summary

CyberSecurity Summary

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
  continue reading
 
Artwork

4
The Lead Tech Podcast | The Talk Show For Electronics Repair Shops

The Lead Tech Podcast | The Talk Show For Electronics Repair Shops

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Do you want to take your repair shop to the next level? Our owners helped grow some of the largest repair shops in the southeast including The Computer Warriors, Mr. Phix, Mobile Zone, and Smart Touch Repair Center. The Lead Tech Podcast aims to help you expand your offerings to data recovery, forensics, networking, board-level repair, and to deliver an unbelievable customer service experience. Become the largest repair shop in town and gain the competitive advantage.
  continue reading
 
Artwork
 
Join hosts Debbie Dujanovic, Sheryl Worsley and Becky Bruce in a virtual citizens' academy with the FBI in Salt Lake City, Utah. Learn about how agents respond to crimes and threats ranging from human sex trafficking to counterterrorism and intelligence to mass shootings and even the mafia. Take a virtual tour of the technology used by the evidence response teams that help process crime scenes and work your way through the firearms training simulator as agents explain how and why to use dead ...
  continue reading
 
Loading …
show series
 
A detailed guide for aspiring and experienced digital forensic investigators, covering a broad spectrum of topics essential to the field. It begins by introducing various types of computer-based investigations, from criminal to corporate, and then explains the meticulous forensic analysis process, including workstation setup, software, and evidence…
  continue reading
 
A comprehensive guide to Linux, focusing on certification and practical administration. It covers fundamental Linux concepts like filesystems, shell commands, and process management, alongside advanced topics such as network configuration, server deployment, and cloud technologies. The text also addresses security, troubleshooting, and performance …
  continue reading
 
An official textbook for individuals pursuing careers in network administration or seeking to enhance their professional knowledge. The book comprehensively covers fundamental networking concepts, beginning with an overview of network types, topologies, and basic connectivity, and progressing to detailed explanations of protocols and models like TC…
  continue reading
 
Send us a text A blue jay, a busted feeder, and a brand-new camera set the tone, but only briefly. We kick off the new year with updates from the Florida ICAC conference, including firsthand courtroom experience watching frame rate and frame count testimony in action. The episode centers on Frame Counts Galore, an open-source script for extracting …
  continue reading
 
Phil Anderson from Northumbria University joins the Forensic Focus Podcast to discuss the launch of the Forensic Focus International Well-Being Study — a global research project examining the psychological and physical impact of digital forensic work across both law enforcement and the private sector. Drawing on his 24-year academic career and long…
  continue reading
 
A rigorous, introductory treatment of modern cryptography, focusing on definitions, precise assumptions, and proofs of security as distinguishing features from classical cryptography. It explores private-key encryption in depth, covering concepts like chosen-plaintext attacks (CPA-security) and chosen-ciphertext attacks (CCA-security), along with p…
  continue reading
 
A hands-on introduction to compiler construction, emphasizing Java technology and software engineering principles. It guides readers through the process of building and extending a real, functional Java compiler for a Java subset called "j--". The material covers fundamental compiler phases, including lexical analysis (scanning), parsing (syntax-di…
  continue reading
 
A comprehensive guide to deep learning for web development, specifically with Python. It covers the foundational concepts of machine learning and neural networks, including various types like CNNs and RNNs, and essential terminology such as bias, variance, overfitting, and underfitting. The sources provide practical instruction on building and depl…
  continue reading
 
[email protected] Preparing for the CompTIA A+ Core 2 exam requires more than just chasing icons—it demands a deep understanding of how Windows truly works. In this episode, we explore the technician mindset that transforms scattered Windows settings into a navigable system you can confidently manage under exam pressure. Whether you're part o…
  continue reading
 
[email protected] In this episode of Technology Tap: CompTIA Study Guide, we explore a groundbreaking shift in cybersecurity threats focused on operational availability instead of data theft. Using five headline patterns from 2025, including a case where hospital scheduling systems were compromised, we highlight critical lessons for IT skills…
  continue reading
 
A detailed guide to web hacking, IT security, and ethical hacking practices. It systematically explores a wide array of vulnerabilities and attack methodologies common to web applications, alongside corresponding defense techniques. The document is structured to educate readers on fundamental web technologies, popular hacking tools, and practical l…
  continue reading
 
Functions as an all-in-one exam guide for the GPEN certification, covering essential penetration testing methodologies and tools. It includes detailed chapters on reconnaissance, initial access, execution, and reporting, with specific sections dedicated to the Metasploit Framework and PowerShell Empire. The guide emphasizes practical application th…
  continue reading
 
A practical guide for intermediate-to-advanced JavaScript developers. It focuses on using the RxJS library to build asynchronous, event-driven web applications, particularly with Angular and NestJS. The book provides numerous real-world solutions and recipes covering topics like error and side effect handling, UI building, performance optimization,…
  continue reading
 
A practical resource for web developers looking to deepen their understanding of React. Authored by Maximilian Schwarzmüller, a prominent online instructor, the book covers a wide array of topics crucial for building modern user interfaces, including components, JSX, state management, event handling, styling, routing with React Router, and advanced…
  continue reading
 
Explores the multifaceted world of interacting with and optimizing large language models (LLMs) and generative AI for both text and image creation. It covers fundamental prompt engineering principles, such as giving clear instructions, specifying output formats, and providing examples, alongside advanced techniques like text style unbundling and ta…
  continue reading
 
[email protected] What if the scariest hacks of 2025 never looked like hacks at all? We break down five real-world scenarios where attackers didn’t smash locks—they used the keys we handed them. From an AI-cloned voice that sailed through a wire transfer to a building’s HVAC console that quietly held elevators and doors hostage, the common th…
  continue reading
 
Send us a text What really changed in digital pathology this year—and what still needs work? As we close out 2025 and step into 2026, I wanted to pause, reflect, and share what I’ve seen shift from theory to real-world practice across labs, conferences, and clinical workflows. I look back at the most meaningful developments in digital pathology and…
  continue reading
 
A quick syntax reference for C++20, offering a comprehensive overview of the language's core features and functionalities. It covers fundamental programming concepts such as variables, data types, operators, and control flow (loops and conditionals). The text also explores object-oriented programming principles including classes, constructors, inhe…
  continue reading
 
In the final episode of the year, we bring everything together—file systems, memory, timelines, flash storage, and user activity—to show how real digital cases are solved from start to finish. This episode walks through how a single overlooked artifact can become the final piece that breaks a case wide open. We also reflect on the season and tease …
  continue reading
 
A practical guide for developing and deploying responsive, RESTful web applications using the Flask framework. The book covers fundamental concepts of web application development, starting with Python for CGI and the Web Server Gateway Interface (WSGI), before moving into the Flask framework and its dependencies like Werkzeug, Jinja2, and Click. It…
  continue reading
 
[email protected] Explore how Napster revolutionized technology education by changing the way we interact with digital files and access information. This episode delves into the transformation from physical media to digital packets, illustrating key moments that reshaped internet culture and technology. Whether you're preparing for your CompT…
  continue reading
 
A comprehensive educational resource for understanding foundational machine learning concepts. The text introduces readers to the principles and applications of machine learning, categorizing different learning approaches such as supervised, unsupervised, and reinforcement learning. It then explores various algorithms, including linear and logistic…
  continue reading
 
Focuses on creating, deploying, and managing blockchain applications on Amazon Web Services (AWS). The text explores foundational blockchain concepts, contrasting them with traditional centralized systems and highlighting benefits like immutability and decentralization. It provides practical instruction on utilizing AWS Managed Blockchain, AWS Bloc…
  continue reading
 
A comprehensive guide to understanding and developing applications using blockchain technology. The book covers fundamental blockchain concepts, including its history, core components, and various consensus mechanisms like Proof of Work and Proof of Stake. It further explores key platforms like Bitcoin and Ethereum, detailing their architecture, tr…
  continue reading
 
A guide for white-hat hackers participating in bug bounty programs. It covers fundamental concepts like bug bounty platforms, methodologies, and the process of reporting vulnerabilities effectively. The text explores various common web application vulnerabilities in detail, including Cross-Site Request Forgery (CSRF), Cross-Site Scripting (XSS), SQ…
  continue reading
 
In this Edge AIsle episode, we summarize the key insights from Hailo edge AI’s blog Bringing Generative AI to the Edge: LLM on Hailo-10H. As generative AI continues to reshape industries, Large Language Models are becoming increasingly powerful, but also increasingly demanding in terms of compute, memory, and cost. This episode explains why traditi…
  continue reading
 
Explores the transformative potential of Blockchain technology, particularly in e-governance and various enterprise applications. It begins by detailing the foundational concepts of Blockchain, including its cryptographic principles, consensus mechanisms, and different platform types like Ethereum and Hyperledger Fabric. The document then highlight…
  continue reading
 
A comprehensive guide for developing web, cloud, and microservices applications using Java MVC. It introduces the fundamental Model-View-Controller (MVC) design pattern, tracing its history and adaptation for web applications, especially within the Java EE/Jakarta EE ecosystem utilizing JSR-371. The text covers practical aspects of setting up a dev…
  continue reading
 
[email protected] In this episode of Technology Tap: CompTIA Study Guide, my students dive into the notorious Cambridge Analytica scandal and its profound impact on data privacy and technology ethics. Our students break down how seemingly harmless personality quizzes exploited Facebook data, creating psychological profiles that influenced ele…
  continue reading
 
In this episode, we break down the challenges and opportunities of flash storage forensics. From SSDs and USB drives to smartphones, learn how wear leveling, TRIM commands, and encryption impact evidence recovery—and why “deleted” doesn’t always mean gone. Real-world cases and practical techniques show how investigators adapt in the modern storage …
  continue reading
 
Focusing on practical applications of machine learning (ML) within the Amazon Web Services ecosystem. The content systematically covers the exam syllabus, starting with ML fundamentals like modeling pipelines, supervised and unsupervised learning, and data splitting strategies to prevent overfitting and underfitting. It then details various AWS ser…
  continue reading
 
Si and Desi close out the year on the Forensic Focus Podcast with a wide-ranging end-of-2025 wrap-up, reflecting on how the year unfolded for the show and the DFIR community. They discuss the mental health series, guest appearances, and how everyday technologies — from streaming services to wearables — are increasingly intersecting with forensic in…
  continue reading
 
Offers an extensive guide to implementing VXLAN BGP EVPN fabrics, focusing heavily on the spine-and-leaf architecture in data center networking. It details the logical and physical components necessary for fabric creation, including the configuration of the underlay network using protocols like OSPF and IS-IS, and establishing the overlay network w…
  continue reading
 
[email protected] Explore the pivotal moment in technology education as we trace the origins of the internet browser from Mosaic’s innovation at NCSA to Netscape Navigator's rise as the gateway to the web. This episode dives deep into internet history, highlighting the major players like Jim Clark and Marc Andreessen who shaped the early web …
  continue reading
 
A comprehensive guide for designing and developing enterprise Python code. It covers a vast array of topics, including best practices for code structure and quality (e.g., commenting, naming conventions, and PEP 8), effective use of Python data structures (lists, dictionaries, sets, and tuples), and object-oriented programming concepts (classes, in…
  continue reading
 
Detailing the configuration and use of Traefik as an API gateway in a microservices environment. The text explains the shift from monolithic to microservices architecture and the need for dynamic gateway solutions like Traefik, which offers features such as load balancing (Round Robin, Weighted Round Robin, Mirroring) for HTTP, TCP, and UDP traffic…
  continue reading
 
An extensive overview of systems analysis and design, primarily focusing on the tenth edition of a textbook on the subject, likely by Kendall and Kendall. The content comprehensively covers the phases of the systems development life cycle (SDLC), including project management techniques such as feasibility analysis, PERT diagrams, and various conver…
  continue reading
 
[email protected] In this episode of Technology Tap: CompTIA Study Guide, we dive deep into incident response, forensics, and monitoring essentials crucial for your tech exam prep. Learn the full incident response lifecycle—preparation, detection, analysis, containment, eradication, recovery, and lessons learned—to develop your IT skills and …
  continue reading
 
Keith Lockhart from Oxygen Forensics joins Si and Desi on the Forensic Focus Podcast to examine how remote digital evidence collection is changing investigative workflows across DFIR, eDiscovery, and corporate investigations. Drawing on recent XiB mobile training and real-world deployments, Keith explains where remote and agent-based acquisition de…
  continue reading
 
A detailed overview of the various phases, concepts, and tools involved in the Systems Development Life Cycle (SDLC). The text covers organizational topics such as the role and required skills of a systems analyst, the structure of the IT department, and strategic planning, including cost-benefit analysis and feasibility studies. It extensively exp…
  continue reading
 
An extensive guide to computer hacking for beginners, detailing various types of hackers, including Black Hat, White Hat, and Grey Hat practitioners. It thoroughly explains the most popular hacking technique, social engineering, outlining different forms such as Phishing, Impersonation, Vishing, and Smishing, which exploit human vulnerabilities. Fu…
  continue reading
 
Send us a text What if the biggest breakthrough in pathology AI isn’t a new algorithm—but finally sharing the data we already have? In this episode, I’m joined by Jeroen van der Laak and Julie Boisclair from the IMI BigPicture consortium, a European public-private initiative building one of the world’s largest digital pathology image repositories. …
  continue reading
 
In this episode of F for Forensics, we explore how investigators transform scattered artifacts into a clear digital narrative using forensic timelines. From MACB timestamps and registry entries to browser data, logs, and super timelines, this episode breaks down how timelines reveal patterns, expose anomalies, and connect user actions across system…
  continue reading
 
[email protected] What if your help desk could solve recurring IT problems in minutes, not hours? In this episode, we explore the backbone of reliable IT support, focusing on clear SOPs that remove guesswork, SLAs that align technical work with business risk, and an effective ticketing flow that transforms scattered fixes into measurable outc…
  continue reading
 
A comprehensive technical overview of synchronization and timing solutions within telecommunications, with a specific focus on 4G and 5G mobile networks. It explores the historical necessity of synchronization, progressing from frequency alignment for digital networks to the modern requirement for phase and time synchronization driven by mobile bas…
  continue reading
 
An educational resource detailing statistical concepts foundational to machine learning, including descriptive statistics (mean, median, mode, and measures of dispersion), probability theory, and methods for parameter estimation and hypothesis testing. The book covers various analytical techniques such as ANOVA, regression models (linear, logistic,…
  continue reading
 
[email protected] In this episode of Technology Tap: CompTIA Study Guide, we explore the fascinating evolution of technology from the launch of Sputnik in 1957 to the ubiquitous smartphones of today. Discover how early innovations like ARPANET laid the groundwork for the internet, shaping the landscape of technology education and IT skills de…
  continue reading
 
A comprehensive guide for learning iOS app development, starting with the fundamentals of the Swift programming language, including variables, control flow, and collections. The book thoroughly explains the use of Apple's development tools, such as Xcode and Playgrounds, and covers key application architecture concepts like Model-View-Controller (M…
  continue reading
 
A book about building scalable data streaming solutions using various Amazon Web Services (AWS) tools, primarily focusing on the Amazon Kinesis family of services (Data Streams, Firehose, Data Analytics, and Video Streams). The content explains the core concepts of data streaming and distributed systems, detailing how to produce and consume data us…
  continue reading
 
Explores several critical areas concerning the security and privacy of online platforms. The chapters discuss privacy-preserving analytics techniques for social network data, including methods like k-anonymity and differential privacy, to protect user information from breaches such as the Cambridge Analytica incident. Several sections are dedicated…
  continue reading
 
Loading …
Copyright 2026 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play