Nilesh Mishra
How To Analyze the memory dump , Network Tracking and Process Monitoring
Creating a Forensic Image using FTK ( Cyber Forensic Practical 1 (part 2) )
How To perform Email Forensic
How to perform steganography (cyber Forensic Pratical 7)
How to Perform web Browser Forensic (cyber Forensic Practical 10)
Capturing and analyzing network packets using wireshark ( Cyber Forensic Practical : 4 )
Creating a Forensic Image using FTK Imager ( Cyber Forensic Practical 1 )