Natsar, LLC/EXIF in Focus: Unlocking Metadata for Digital Investigations

  • Free

EXIF in Focus: Unlocking Metadata for Digital Investigations

  • Course
  • 1 Lesson

Earn Continuing Professional Education (CPE) credits at no cost from Natsar.

Learn how exchangeable image file format (EXIF) data in photos and videos reveals critical metadata, including timestamps, device details, and even geolocation. In this session, Josh Moulin, Principal at Natsar, explains how EXIF data works, its role in digital forensics, and how to protect your privacy by managing metadata effectively.

Contents

EXIF in Focus: Unlocking Metadata for Digital Investigations

EXIF in Focus: Unlocking Metadata for Digital Investigations

    What You Will Learn

    Learn how exchangeable image file format (EXIF) data in photos and videos reveals critical metadata, including timestamps, device details, and even geolocation. In this session, Josh Moulin, Principal at Natsar, explains how EXIF data works, its role in digital forensics, and how to protect your privacy by managing metadata effectively. This video is ideal for cybersecurity professionals, students, and anyone interested in digital forensics and privacy. Have questions or comments? Leave them below, and we’ll do our best to respond. Key topics covered include:

    • What is EXIF data, and why does it matter?

    • How metadata is embedded in photos, videos, and audio files

    • Viewing EXIF data with basic tools and advanced methods like ExifTool

    • Privacy risks associated with location and device metadata

    • How EXIF data supports digital forensics investigations

    • Practical demo of extracting and stripping EXIF data using Kali Linux

    Link to ExifTool used in this demo: https://exiftool.org/

    For more cybersecurity resources, visit https://Natsar.com.

    Subscribe now for more practical tips and insights on cybersecurity. You can also sign up for Natsar’s newsletter at https://natsar.substack.com.

    Josh Moulin

    Meet Your Instructor

    Josh Moulin

    MSc., CAWFE, CEH, CFCE, CHFI, CISSP, CNDA, DFCP, GCFA, GCFR, GCIA, GIME, GSEC

    Josh Moulin is a cybersecurity leader with over 20 years of experience protecting critical systems and advising organizations worldwide. He began his career in law enforcement, where he led a cybercrimes task force and a digital forensics lab, pioneering efforts to combat cyber crime. Later, Josh served as a CIO and CISO in the U.S. nuclear weapons complex and as Senior Vice President of Operations at the Center for Internet Security (CIS), where he collaborated with DHS and CISA to secure U.S. state, local, tribal, territorial (SLTT), and election organizations through the MS-ISAC and EI-ISAC. He also served as an Executive Partner at Gartner, advising federal and military leaders on strategic cybersecurity initiatives.

    In addition to founding Natsar, LLC, a cybersecurity consulting firm, Josh is adjunct faculty teaching university courses on cybersecurity and digital forensics. With a Master’s in Information Security and Assurance and numerous certifications, Josh’s highly rated courses draw from real-world expertise to equip learners with the tools to navigate today’s complex cybersecurity landscape.

    You May Also Like

    • $29.95

    Risk Register

    • Download
    • 1 file
    • Includes 1 additional product

    Frequently asked questions

    You've got questions. We've got answers.

    Is this really free?

    Yes! We understand that finding quality CPEs is difficult and can be expensive. We are giving back to the cybersecurity community by providing no-cost continuing education.

    Do I get a certificate?

    Absolutely. Once you complete the presentation, you will receive a certificate that can be used to provide evidence of your training when submitted CPEs. The certificate is available immediately upon the completion of the content.

    Do you offer customized training?

    We definintely do. Natsar has trained individuals, companies, and organizations across the world in various cybersecurity topics. If you're interested in having us do some training for you, please reach out at [email protected]!