IT Surveillance and Computer Forensics from Scratch

IT Surveillance and Computer Forensics from Scratch

IT Surveillance and Computer Forensics from Scratch. With the help of this course you can Surveillance Methods and Computer Forensics Basics – 101 Video Training with PDFs. Practical hacking techniques..

This course was created by Hacking School & IT Security Academy. It was rated 4.9 out of 5 by approx 5202 ratings. There are approx 31078 users enrolled with this course, so don’t wait to download yours now. This course also includes 5 hours on-demand video, 2 Articles, 3 Supplemental Resources, Full lifetime access, Access on mobile and TV & Certificate of Completion.

What Will You Learn?

  • IT Surveillance Methods

  • Computer Forensics from Scratch

  • 30+ TRAINING VIDEO TUTORIALS

  • Source code package ready for download

  • Evidence colletion basics

  • Evidence left in LAN and the Internet

  • Evidence left in the local system

  • Unethical hacking: Risks

  • Restricting access

  • Taking over a remote computer

  • Acquiring data from different sources

  • Steganography techniques

LAST UPDATED: 02/2018

Welcome to Hacking School!

IT Surveillance and Computer Forensics from Scratch Course

Before we begin: the practical use of the course you are going to see has been proven by thousands of people all over the world – beginners and computer geeks as well. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we’d like to share with you.


What you can expect from this course and what you will learn:

  • You will get over 30 lectures and 7+ hours of content!
  • You will get free source code package to download


What you will learn:

  • Transmitting volatile evidence from an evaluated system
  • Disk backup over the network
  • Searching data based on last access or modification timestamps
  • Analyzing the data sent by a web browser
  • Analyzing the data revealed in e-mail headers
  • Remote capturing the data about user and hardware
  • Harvesting user’s IP address on message board
  • Methods of creating a partition image
  • Hiding data inside NTFS alternate data streams
  • Steganography techniques
  • Using tunneling to access firewall-protected services
  • File encryption methods and vulnerabilities
  • Recovering MS Windows user passwords
  • Analyzing run applications based on Prefetch folder
  • Acquiring data from pagefile, thumbnails and raw disk fragments
  • Acquiring data from binary files and process memory dump
  • Acquiring data from e-mail files
  • Acquiring user’s browsing history
  • Discovering web search queries
  • Examining remote host’s availability over LAN
  • Checking e-mail’s deliverability and analyzing recipient’s data
  • Creating and installing a keylogger
  • Building custom tools to analyze system security
  • Taking over a remote computer
  • Restricting access to chosen websites and computers
  • Using WMI console for acquiring and analyzing evidence
  • Using DNS cache for gathering information on visited websites
  • Using Sleuth Kit for acquiring data from a disk image
  • Recovering passwords to FTP, e-mail accounts and websites
  • Analyzing a corporate data leak scenario

We guarantee your 100% satisfaction or you will get your money back. You have 30 days to decide if this course is for you. You will get access to the whole system. If for any reason you’re not satisfied with your training, you will get a full refund. No questions asked.

Good luck and see you on the other side,
Andrew Harper || Hacking School Team

Rating:
4.6

Download Links

Get Download Link

Related Courses

Digital/Cyber Forensic From Scratch

Computer Hacking Forensic Investigator (CHFI) Expert Level

Computer Hacking Forensic Investigator (CHFI) Beginner Level

Computer Hacking Forensic Investigator (CHFI)

EC1-349 ECCouncil Computer Hacking Forensic Investigator

EC1-349 EC Council Computer Hacking Forensic Investigator

EC1-349 ECCouncil Computer Hacking Forensic Investigaton

Computer Hacker and Forensic Investigator Training

Computer Networks Security from Scratch to Advanced

The Scratch Academy – Entry Level Computer Programming

Digital Forensic Series: Computer Forensics

Digital Forensic Series: Computer Forensics

2017 – Computer Build a Customized PC Computer from Scratch

2017 – Computer Build a Customized PC Computer from Scratch

Become Computer Forensics Expert & Start your career!

Become Computer Forensics Expert & Start your career!

Computer Forensics Fundamentals

Computer Forensics Fundamentals

Intermediate Computer Forensics

Intermediate Computer Forensics

How to Build a Computer from Scratch: Complete Blueprint

How to Build a Computer from Scratch: Complete Blueprint

312-49V8 ECCouncil Computer Hacking Forensic Investigator

312-49V8 ECCouncil Computer Hacking Forensic Investigator

EC1-349 ECCouncil Computer Hacking Forensic Investigator

EC1-349 ECCouncil Computer Hacking Forensic Investigator

Digital/Cyber Forensic From Scratch

Digital/Cyber Forensic From Scratch

EC1-349 EC Council Computer Hacking Forensic Investigator

EC1-349 EC Council Computer Hacking Forensic Investigator
Go To Top