Autoplay
Autocomplete
Previous Lesson
Complete and Continue
IT Surveillance and Computer Forensics from Scratch HACKING+
Introduction
What you will learn (1:45)
Before you start
Get your source code package
System configuration
Environment Preparation (3:08)
Video Training
Transmitting volatile evidence from an evaluated system (27:12)
Disk backup over the network (7:46)
Searching data based on last access or modification timestamps (13:21)
Analyzing the data sent by a web browser (7:50)
Analyzing the data revealed in e-mail headers (4:23)
Remote capturing the data about user and hardware (9:28)
Harvesting user's IP address on message board (10:30)
Methods of creating a partition image (16:28)
Hiding data inside NTFS alternate data streams (7:23)
Steganography techniques (11:02)
Using tunneling to access firewall-protected services (5:18)
File encryption methods and vulnerabilities (12:07)
Recovering MS Windows user passwords (6:03)
Analyzing run applications based on Prefetch folder (8:19)
Acquiring data from pagefile, thumbnails and raw disk fragments (11:03)
Acquiring data from binary files and process memory dump (5:11)
Acquiring data from e-mail files (13:33)
Acquiring user's browsing history (6:38)
Discovering web search queries (2:25)
Examining remote host's availability over LAN (5:42)
Checking e-mail's deliverability and analyzing recipient's data (9:12)
Creating and installing a keylogger (12:00)
Building custom tools to analyze system security (14:11)
Restricting access to chosen websites and computers (13:11)
Taking over a remote computer (13:20)
Using WMI console for acquiring and analyzing evidence (5:26)
Using DNS cache for gathering information on visited websites (3:50)
Using Sleuth Kit for acquiring data from a disk image (10:38)
Recovering passwords to FTP, e-mail accounts and websites (9:28)
Analyzing a corporate data leak scenario (10:37)
Handbook: Evidence collection basics (BONUS)
Evidence collection basics
Handbook: Evidence left in Local Area Network and the Internet (BONUS)
Handbook: Evidence left in Local Area Network and the Internet (BONUS)
Handbook: Evidence left in the local system (BONUS)
Handbook: Evidence left in the local system (BONUS)
Building custom tools to analyze system security
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock