fbpx

IT Surveillance and Computer Forensics from Scratch

Surveillance Methods and Computer Forensics Basics – 101 Video Training with PDFs.

5804 STUDENTS ENROLLED
  • Profile photo of Sukanya
  • Profile photo of Johan
  • Profile photo of Marcel
  • Profile photo of Lionel
  • Profile photo of 404 Error
  • Profile photo of Carl

IT Surveillance and Computer Forensics from Scratch Course

Before we begin: the practical use of the course you are going to see has been proven by thousands of people all over the world – beginners and computer geeks as well. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we’d like to share with you.

What you can expect from this course and what you will learn:

  • You will get over 30 lectures and 7+ hours of content!
  • You will get free source code package to download
  • You will learn: Transmitting volatile evidence from an evaluated system
  • Disk backup over the network
  • Searching data based on last access or modification timestamps
  • Analyzing the data sent by a web browser
  • Analyzing the data revealed in e-mail headers
  • Remote capturing the data about user and hardware
  • Harvesting user’s IP address on message board
  • Methods of creating a partition image
  • Hiding data inside NTFS alternate data streams
  • Steganography techniques
  • Using tunneling to access firewall-protected services
  • File encryption methods and vulnerabilities
  • Recovering MS Windows user passwords
  • Analyzing run applications based on Prefetch folder
  • Acquiring data from pagefile, thumbnails and raw disk fragments
  • Acquiring data from binary files and process memory dump
  • Acquiring data from e-mail files
  • Acquiring user’s browsing history
  • Discovering web search queries
  • Examining remote host’s availability over LAN
  • Checking e-mail’s deliverability and analyzing recipient’s data
  • Creating and installing a keylogger
  • Building custom tools to analyze system security
  • Taking over a remote computer
  • Restricting access to chosen websites and computers
  • Using WMI console for acquiring and analyzing evidence
  • Using DNS cache for gathering information on visited websites
  • Using Sleuth Kit for acquiring data from a disk image
  • Recovering passwords to FTP, e-mail accounts and websites
  • Analyzing a corporate data leak scenario

We guarantee your 100% satisfaction or you will get your money back. You have 30 days to decide if the Wireless Network Hacking Course is for you. You will get access to the whole system. If for any reason you’re not satisfied with your training, you will get a full refund. No questions asked.

Good luck and see you on the other side,
Andrew Harper || Hacking School Team

What are the requirements?

  • Basic IT skills

What am I going to get from this course?

  • IT Surveillance Methods
  • Computer Forensics from Scratch
  • 30+ TRAINING VIDEO TUTORIALS
  • Source code package ready for download
  • Evidence colletion basics
  • Evidence left in LAN and the Internet
  • Evidence left in the local system
  • Unethical hacking: Risks
  • Restricting access
  • Taking over a remote computer
  • Acquiring data from different sources
  • Steganography techniques

What is the target audience?

  • IT sec beginners and professionals

Course Curriculum

Introduction
What you will learn FREE 00:01:45
Before you start
Get your source code package 00:00:00
System configuration
Environment Preparation FREE 00:03:00
Video Training
Transmitting volatile evidence from an evaluated system 00:27:00
Disk backup over the network 00:08:00
Searching data based on last access or modification timestamps 00:14:00
Analyzing the data sent by a web browser 00:08:00
Analyzing the data revealed in e-mail headers 00:05:00
Remote capturing the data about user and hardware 00:10:00
Harvesting user’s IP address on message board 00:11:00
Methods of creating a partition image 00:16:28
Hiding data inside NTFS alternate data streams 00:07:23
Steganography techniques 00:11:02
Using tunneling to access firewall-protected services 00:05:18
File encryption methods and vulnerabilities 00:12:07
Recovering MS Windows user passwords 00:06:03
Analyzing run applications based on Prefetch folder 00:08:19
Acquiring data from pagefile, thumbnails and raw disk fragments 00:11:02
Acquiring data from binary files and process memory dump 00:05:11
Acquiring data from e-mail files 00:13:33
Acquiring user’s browsing history 00:06:38
Discovering web search queries 00:02:25
Examining remote host’s availability over LAN 00:05:42
Checking e-mail’s deliverability and analyzing recipient’s data 00:09:12
Creating and installing a keylogger 00:12:00
Building custom tools to analyze system security 00:14:11
Taking over a remote computer 00:13:20
Restricting access to chosen websites and computers 00:05:26
Using WMI console for acquiring and analyzing evidence 00:13:11
Using DNS cache for gathering information on visited websites FREE 00:03:50
Using Sleuth Kit for acquiring data from a disk image 00:10:38
Recovering passwords to FTP, e-mail accounts and websites 00:09:28
Analyzing a corporate data leak scenario 00:10:37
Handbook: Evidence collection basics (BONUS)
Handbook: Evidence collection basics 01:30:00
Handbook: Evidence left in Local Area Network and the Internet (BONUS)
Handbook: Evidence left in Local Area Network and the Internet 01:15:00
Handbook: Evidence left in the local system (BONUS)
Handbook: Evidence left in the local system 01:45:00

Course Reviews

4.7

429 ratings
  • 1 stars0
  • 2 stars0
  • 3 stars0
  • 4 stars0
  • 5 stars0

No Reviews found for this course.

TAKE THIS COURSE
  • $127.00
  • UNLIMITED ACCESS
  • Course Badge
  • Course Certificate
  • 36 Lectures
  • 9 hours, 30 minutes
  • All skill levels
  • VIDEOS + PDFS
  • ZIP package with the source code included
  • Money back guarantee