NitroFlare IT Surveillance and Computer Forensics from Scratch

Discussion in 'E-Books & Tutorials' started by kocogi, Dec 24, 2015.

  1. kocogi

    kocogi Active Member

    May 29, 2012
    Likes Received:
    Trophy Points:
    IT Surveillance and Computer Forensics from Scratch
    MP4 | Video: 1280x720 | 109 kbps | 44 KHz | Duration: 6 Hours | 1.24 GB
    Genre: eLearning | Language: English

    Surveillance Methods and Computer Forensics Basics - 101 Video Training with PDFs

    Welcome to Hacking School!

    IT Surveillance and Computer Forensics from Scratch Course

    Before we begin: the practical use of the course you are going to see has been proven by thousands of people all over the world - beginners and computer geeks as well. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we'd like to share with you.

    What you can expect from this course and what you will learn:

    You will get over 30 lectures and 7+ hours of content!
    You will get free source code package to
    You will learn: Transmitting volatile evidence from an evaluated system
    Disk backup over the network
    Searching data based on last access or modification timestamps
    Analyzing the data sent by a web browser
    Analyzing the data revealed in e-mail headers
    Remote capturing the data about user and hardware
    Harvesting user's IP address on message board
    Methods of creating a partition image
    Hiding data inside NTFS alternate data streams
    Steganography techniques
    Using tunneling to access firewall-protected services
    File encryption methods and vulnerabilities
    Recovering MS Windows user passwords
    Analyzing run applications based on Prefetch folder
    Acquiring data from pagefile, thumbnails and raw disk fragments
    Acquiring data from binary files and process memory dump
    Acquiring data from e-mail files
    Acquiring user's browsing history
    Discovering web search queries
    Examining remote host's availability over LAN
    Checking e-mail's deliverability and analyzing recipient's data
    Creating and installing a keylogger
    Building custom tools to analyze system security
    Taking over a remote computer
    Restricting access to chosen websites and computers
    Using WMI console for acquiring and analyzing evidence
    Using DNS cache for gathering information on visited websites
    Using Sleuth Kit for acquiring data from a disk image
    Recovering passwords to FTP, e-mail accounts and websites
    Analyzing a corporate data leak scenario
    Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me
    Download ( NitroFlare )

Share This Page