一品教程
IT Surveillance And Computer Forensics From Scratch
  • 百度链接:请在正文中查找
  • 提取码:请在正文中查找
  • 阿里云(不限速):
  • 天翼链接(不限速):
  • 天翼提取:
  • 115链接:
  • 备用地址:
  • 解压密码:
  • 资源类型:
  • 文件大小: MB
  • 发布时间:2016-9-13 14:36
  • 人       气:118
  • 回复数量:0
发新帖
http://pan.baidu.com/s/1eRgplku 密码: 9jqb

IT Surveillance and Computer Forensics from ScratchMP4 | Video: 1280x720 | 109 kbps | 44 KHz | Duration: 6 Hours | 1.24 GBGenre: eLearning | Language: EnglishSurveillance Methods and Computer Forensics Basics - 101 Video Training with PDFs
Welcome to Hacking School!
IT Surveillance and Computer Forensics from Scratch Course
Before we begin: the practical use of the course you are going to see has been proven by thousands of people all over the world – beginners and computer geeks as well. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we'd like to share with you.
What you can expect from this course and what you will learn:
You will get over 30 lectures and 7+ hours of content!You will get free source code package to downloadYou will learn: Transmitting volatile evidence from an evaluated systemDisk backup over the networkSearching data based on last access or modification timestampsAnalyzing the data sent by a web browserAnalyzing the data revealed in e-mail headersRemote capturing the data about user and hardwareHarvesting user's IP address on message boardMethods of creating a partition imageHiding data inside NTFS alternate data streamsSteganography techniquesUsing tunneling to access firewall-protected servicesFile encryption methods and vulnerabilitiesRecovering MS Windows user passwordsAnalyzing run applications based on Prefetch folderAcquiring data from pagefile, thumbnails and raw disk fragmentsAcquiring data from binary files and process memory dumpAcquiring data from e-mail filesAcquiring user's browsing historyDiscovering web search queriesExamining remote host's availability over LANChecking e-mail's deliverability and analyzing recipient's dataCreating and installing a keyloggerBuilding custom tools to analyze system securityTaking over a remote computerRestricting access to chosen websites and computersUsing WMI console for acquiring and analyzing evidenceUsing DNS cache for gathering information on visited websitesUsing Sleuth Kit for acquiring data from a disk imageRecovering passwords to FTP, e-mail accounts and websitesAnalyzing a corporate data leak scenario
本站首发,永久链接:https://www.yipinsucai.com/thread-106906-1-1.html
收藏0 0 反对0
分享
  • 猜您喜欢
  • 热门素材
  • 下载排行
  • 最新资源

微信订阅号

Copyright   ©2012-2021  一品教程论坛技术支持:一品素材教程网  站点帮助   ( 蜀ICP备17010416号-1 )|网站地图 | 站点地图| 网站地图 | 网站地图