Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Ethical Hacking Practices 2022-23: IT Surveillance and Computer Forensics
Ethical Hacking Practices 2021-22: IT Surveillance and Computer Forensics
Introduction to Course Content (1:45)
Chapter 1 A - Environment Preparation (3:08)
Chapter 1 B - Transmitting Volatile Evidence from Evaluated Systems (27:12)
Chapter 2 -Disk Backup Over the Network (7:46)
Chapter 3 - Searching Data (13:21)
Chapter 4 - Analyzing Data Sent by Web Browser (7:50)
Chapter 5 - Analyzing Data Revealed in E-mail Headers (4:23)
Chapter 6 - Remote Capturing User & Hardware Data (7:36)
Chapter 7 - Harvesting User's IP Address (10:30)
Chapter 8 - Creating a Partition Image (16:28)
Chapter 9 - Hiding Data Inside NTFS Alternate Data Streams (7:23)
Chapter 10 - Steganography Techniques (11:02)
Chapter 11 - Accessing Firewall-Protected Services (5:18)
Chapter 12 -File Encryption Methods & Vulnerabilities (9:15)
Chapter 13 -Recovering MS Windows User Passwords (6:03)
Chapter 14 -Analyzing Run Applications Based on Prefetch Folder (8:20)
Chapter 15 -Acquiring Data from Pagefile, Thumbnails & Raw Disk Fragments (11:02)
Chapter 16 - Acquiring Data from Binary Files and Process Memory Dump (5:11)
Chapter 17 - Acquiring Data from E-mail Files (13:33)
Chapter 18 - Acquiring User's Browsing History (6:38)
Chapter 19 - Discovering Web Search Queries (2:25)
Chapter 20 - Examining Remote Host's Availability over LAN (5:41)
Chapter 21 - Checking e-mail's deliverability and analyzing recipient's data (9:12)
Chapter 22 - Creating and installing a keylogger (12:00)
Chapter 23 - Building Custom Tools to Analyze System Security (14:11)
Chapter 25 - Restricting Access to Chosen Websites and Computers (13:11)
Chapter 26 - Using WMI Console for Acquiring and Analyzing Evidence (5:26)
Chapter 27 - Using DNS Cache for Data Gathering (3:50)
Chapter 28 - Using Sleuth Kit for Data Acquisition (10:38)
Chapter 29 - Recovering passwords to FTP, E-mail Accounts and Websites (8:00)
Chapter 30 - Analyzing Corporate Data Leak Scenario (10:37)
Source Code Pack
Chapter 25 - Restricting Access to Chosen Websites and Computers
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock