Earn Continuing Professional Education (CPE) credits at no cost from Natsar.
Learn how exchangeable image file format (EXIF) data in photos and videos reveals critical metadata, including timestamps, device details, and even geolocation. In this session, Josh Moulin, Principal at Natsar, explains how EXIF data works, its role in digital forensics, and how to protect your privacy by managing metadata effectively.
Learn how exchangeable image file format (EXIF) data in photos and videos reveals critical metadata, including timestamps, device details, and even geolocation. In this session, Josh Moulin, Principal at Natsar, explains how EXIF data works, its role in digital forensics, and how to protect your privacy by managing metadata effectively. This video is ideal for cybersecurity professionals, students, and anyone interested in digital forensics and privacy. Have questions or comments? Leave them below, and we’ll do our best to respond. Key topics covered include:
What is EXIF data, and why does it matter?
How metadata is embedded in photos, videos, and audio files
Viewing EXIF data with basic tools and advanced methods like ExifTool
Privacy risks associated with location and device metadata
How EXIF data supports digital forensics investigations
Practical demo of extracting and stripping EXIF data using Kali Linux
Link to ExifTool used in this demo: https://exiftool.org/
For more cybersecurity resources, visit https://Natsar.com.
Subscribe now for more practical tips and insights on cybersecurity. You can also sign up for Natsar’s newsletter at https://natsar.substack.com.
Meet Your Instructor
MSc., CAWFE, CEH, CFCE, CHFI, CISSP, CNDA, DFCP, GCFA, GCFR, GCIA, GIME, GSEC
Josh Moulin is a cybersecurity leader with over 20 years of experience protecting critical systems and advising organizations worldwide. He began his career in law enforcement, where he led a cybercrimes task force and a digital forensics lab, pioneering efforts to combat cyber crime. Later, Josh served as a CIO and CISO in the U.S. nuclear weapons complex and as Senior Vice President of Operations at the Center for Internet Security (CIS), where he collaborated with DHS and CISA to secure U.S. state, local, tribal, territorial (SLTT), and election organizations through the MS-ISAC and EI-ISAC. He also served as an Executive Partner at Gartner, advising federal and military leaders on strategic cybersecurity initiatives.
In addition to founding Natsar, LLC, a cybersecurity consulting firm, Josh is adjunct faculty teaching university courses on cybersecurity and digital forensics. With a Master’s in Information Security and Assurance and numerous certifications, Josh’s highly rated courses draw from real-world expertise to equip learners with the tools to navigate today’s complex cybersecurity landscape.
You've got questions. We've got answers.
Yes! We understand that finding quality CPEs is difficult and can be expensive. We are giving back to the cybersecurity community by providing no-cost continuing education.
Absolutely. Once you complete the presentation, you will receive a certificate that can be used to provide evidence of your training when submitted CPEs. The certificate is available immediately upon the completion of the content.
We definintely do. Natsar has trained individuals, companies, and organizations across the world in various cybersecurity topics. If you're interested in having us do some training for you, please reach out at [email protected]!