Find online courses made by experts from around the world.
Take your courses with you and learn anywhere, anytime.
Learn and practice real-world skills and achieve your goals.
LAST COURSE UPDATE: OCTOBER, 2016
Welcome to Hacking School!
IT Surveillance and Computer Forensics from Scratch Course
Before we begin: the practical use of the course you are going to see has been proven by thousands of people all over the world – beginners and computer geeks as well. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we'd like to share with you.
What you can expect from this course and what you will learn:
We guarantee your 100% satisfaction or you will get your money back. You have 30 days to decide if the Wireless Network Hacking Course is for you. You will get access to the whole system. If for any reason you're not satisfied with your training, you will get a full refund. No questions asked.
Good luck and see you on the other side,
Andrew Harper || Hacking School Team
Not for you? No problem.
30 day money back guarantee.
Learn on the go.
Desktop, iOS and Android.
Certificate of completion.
|Section 1: Introduction|
What you will learnPreview
|Section 2: Before you start|
Get your source code package
|Section 3: System configuration|
|Section 4: Video Training|
Transmitting volatile evidence from an evaluated systemPreview
Transmitting volatile evidence from an evaluated system - part 2
Disk backup over the network
Searching data based on last access or modification timestamps
Analyzing the data sent by a web browser
Analyzing the data revealed in e-mail headers
Remote capturing the data about user and hardware
Harvesting user's IP address on message board
Methods of creating a partition image
Hiding data inside NTFS alternate data streams
Using tunneling to access firewall-protected services
File encryption methods and vulnerabilities
Recovering MS Windows user passwords
Analyzing run applications based on Prefetch folder
Acquiring data from pagefile, thumbnails and raw disk fragments
Acquiring data from binary files and process memory dump
Acquiring data from e-mail files
Acquiring user's browsing history
Discovering web search queries
Examining remote host's availability over LAN
Checking e-mail's deliverability and analyzing recipient's data
Creating and installing a keylogger
Building custom tools to analyze system security
Taking over a remote computer
Restricting access to chosen websites and computers
Using WMI console for acquiring and analyzing evidence
Using DNS cache for gathering information on visited websitesPreview
Using Sleuth Kit for acquiring data from a disk image
Recovering passwords to FTP, e-mail accounts and websites
Analyzing a corporate data leak scenario
|Section 5: Handbook: Evidence collection basics (BONUS)|
Evidence collection basics
|Section 6: Handbook: Evidence left in Local Area Network and the Internet (BONUS)|
Handbook: Evidence left in Local Area Network and the Internet (BONUS)
|Section 7: Handbook: Evidence left in the local system (BONUS)|
Handbook: Evidence left in the local system (BONUS)
The Hacking School courses are prepared by people who are professionals in what they do. Authors of our courses are well known in the world of computer systems' security. Some of them took part in prominent international IT contests with great results.
We always provide you with up-to-date knowledge on IT security and ethical hacking. By joining us, you become part of a great international community, willing to help you and discuss.
IT Security Academy is a company that associates IT Security Professionals. Now we are proud to share our knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you pratical skills.