IT Surveillance and Computer Forensics from Scratch

Surveillance Methods and Computer Forensics Basics - 101 Video Training with PDFs
4.0 (57 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
2,194 students enrolled
$19
$100
81% off
Take This Course
  • Lectures 37
  • Length 8.5 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 12/2015 English

Course Description

LAST COURSE UPDATE: OCTOBER, 2016

Welcome to Hacking School!

IT Surveillance and Computer Forensics from Scratch Course


Before we begin: the practical use of the course you are going to see has been proven by thousands of people all over the world – beginners and computer geeks as well. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we'd like to share with you.


What you can expect from this course and what you will learn:

  • You will get over 30 lectures and 7+ hours of content!
  • You will get free source code package to download
  • You will learn: Transmitting volatile evidence from an evaluated system
  • Disk backup over the network
  • Searching data based on last access or modification timestamps
  • Analyzing the data sent by a web browser
  • Analyzing the data revealed in e-mail headers
  • Remote capturing the data about user and hardware
  • Harvesting user's IP address on message board
  • Methods of creating a partition image
  • Hiding data inside NTFS alternate data streams
  • Steganography techniques
  • Using tunneling to access firewall-protected services
  • File encryption methods and vulnerabilities
  • Recovering MS Windows user passwords
  • Analyzing run applications based on Prefetch folder
  • Acquiring data from pagefile, thumbnails and raw disk fragments
  • Acquiring data from binary files and process memory dump
  • Acquiring data from e-mail files
  • Acquiring user's browsing history
  • Discovering web search queries
  • Examining remote host's availability over LAN
  • Checking e-mail's deliverability and analyzing recipient's data
  • Creating and installing a keylogger
  • Building custom tools to analyze system security
  • Taking over a remote computer
  • Restricting access to chosen websites and computers
  • Using WMI console for acquiring and analyzing evidence
  • Using DNS cache for gathering information on visited websites
  • Using Sleuth Kit for acquiring data from a disk image
  • Recovering passwords to FTP, e-mail accounts and websites
  • Analyzing a corporate data leak scenario


We guarantee your 100% satisfaction or you will get your money back. You have 30 days to decide if the Wireless Network Hacking Course is for you. You will get access to the whole system. If for any reason you're not satisfied with your training, you will get a full refund. No questions asked.


Good luck and see you on the other side,
Andrew Harper || Hacking School Team

What are the requirements?

  • Basic IT skills

What am I going to get from this course?

  • IT Surveillance Methods
  • Computer Forensics from Scratch
  • 30+ TRAINING VIDEO TUTORIALS
  • Source code package ready for download
  • Evidence colletion basics
  • Evidence left in LAN and the Internet
  • Evidence left in the local system
  • Unethical hacking: Risks
  • Restricting access
  • Taking over a remote computer
  • Acquiring data from different sources
  • Steganography techniques

What is the target audience?

  • IT sec beginners and professionals

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Introduction
What you will learn
Preview
01:45
Section 2: Before you start
Get your source code package
Article
Section 3: System configuration
Environment Preparation
Preview
03:08
Section 4: Video Training
Transmitting volatile evidence from an evaluated system
Preview
16:02
Transmitting volatile evidence from an evaluated system - part 2
11:10
Disk backup over the network
07:46
Searching data based on last access or modification timestamps
13:21
Analyzing the data sent by a web browser
07:50
Analyzing the data revealed in e-mail headers
04:23
Remote capturing the data about user and hardware
09:27
Harvesting user's IP address on message board
10:30
Methods of creating a partition image
16:28
Hiding data inside NTFS alternate data streams
07:23
Steganography techniques
11:02
Using tunneling to access firewall-protected services
05:18
File encryption methods and vulnerabilities
12:07
Recovering MS Windows user passwords
06:03
Analyzing run applications based on Prefetch folder
08:19
Acquiring data from pagefile, thumbnails and raw disk fragments
11:02
Acquiring data from binary files and process memory dump
05:11
Acquiring data from e-mail files
13:33
Acquiring user's browsing history
06:38
Discovering web search queries
02:25
Examining remote host's availability over LAN
05:42
Checking e-mail's deliverability and analyzing recipient's data
09:12
Creating and installing a keylogger
12:00
Building custom tools to analyze system security
14:11
Taking over a remote computer
13:20
Restricting access to chosen websites and computers
05:26
Using WMI console for acquiring and analyzing evidence
13:11
Using DNS cache for gathering information on visited websites
Preview
03:50
Using Sleuth Kit for acquiring data from a disk image
10:38
Recovering passwords to FTP, e-mail accounts and websites
09:28
Analyzing a corporate data leak scenario
10:37
Section 5: Handbook: Evidence collection basics (BONUS)
Evidence collection basics
55 pages
Section 6: Handbook: Evidence left in Local Area Network and the Internet (BONUS)
Handbook: Evidence left in Local Area Network and the Internet (BONUS)
66 pages
Section 7: Handbook: Evidence left in the local system (BONUS)
Handbook: Evidence left in the local system (BONUS)
90 pages

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Hacking School, IT Security Experts - We turn beginners into professionals.

The Hacking School courses are prepared by people who are professionals in what they do. Authors of our courses are well known in the world of computer systems' security. Some of them took part in prominent international IT contests with great results.

We always provide you with up-to-date knowledge on IT security and ethical hacking. By joining us, you become part of a great international community, willing to help you and discuss.

Instructor Biography

IT Security Academy, IT Security Certified Professional

IT Security Academy is a company that associates IT Security Professionals. Now we are proud to share our knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you pratical skills.

Ready to start learning?
Take This Course