LEARNING FOR LIFE

Get Yourself a Better Life! Free eLearning Download

  • Technical
    • Internet & Networking
    • Security & Hacking
    • AI | Artificial intelligence
    • OS & Server
    • WEB/HTML/CSS/AJAX
    • Database & SQL
    • Programming
    • Perl & PHP
    • .Net & Java
    • Mobile Development
    • C/C++/C#
    • Game Development
    • Unix & Linux
    • MAC OS X
    • Windows
    • OFFICE
    • Operation Systems
    • Hardware
  • Graphic & Media
    • Photography
    • 3D
    • Adobe Product Training
    • Art & Drawing & Painting
    • Film & Film Making
    • Game Designing
    • Music Training
    • Tutorials for designer
  • Business
    • Business & Investing
    • Writing & Affiliate
    • Marketing
    • Sales
    • Economics & Finances
    • Seo & Site Traffic
    • Stock & ForEX
  • Life Stype
    • Self Improvement | MP
    • Mindset | NLP
    • Fashion / Clothing / Grooming
    • Seduction
    • Fighting / Martial Arts
    • Food / Drink / Cooking
    • Health / Fitness / Massage
    • Languages / Accents
    • Magic / Illusions / Tricks
    • Psychology / Body Language
  • Engineering & Science
    • Cultures & History
    • Electrical & Architecture
    • Mathematics & Physics
    • Medical
  • Entertainment
    • Comic
    • Manga
    • Novel
    • Magazine
  • PC Game
    • Mac Game
    • Xbox Game
    • Play Station Game
Home » Ebooks & Tutorials » Technical » Security & Hacking » IT Surveillance and Computer Forensics from Scratch HACKING+ | Udemy

IT Surveillance and Computer Forensics from Scratch HACKING+ | Udemy

26/01/2022 Tut4DL Leave a Comment


IT Surveillance and Computer Forensics from Scratch HACKING+ | Udemy
English | Size: 2.94 GB
Genre: eLearning

What you’ll learn
IT Surveillance Methods
Computer Forensics from Scratch
30+ TRAINING VIDEO TUTORIALS
Source code package ready for download
Evidence collection basics
Evidence left in LAN and the Internet
Evidence left in the local system
Unethical hacking: Risks
Restricting access
Taking over a remote computer
Acquiring data from different sources
Steganography techniques

What you will learn:

Transmitting volatile evidence from an evaluated system

Disk backup over the network

Searching data based on last access or modification timestamps

Analyzing the data sent by a web browser

Analyzing the data revealed in e-mail headers

Remote capturing the data about user and hardware

Harvesting user’s IP address on message board

Methods of creating a partition image

Hiding data inside NTFS alternate data streams

Steganography techniques

Using tunneling to access firewall-protected services

File encryption methods and vulnerabilities

Recovering MS Windows user passwords

Analyzing run applications based on Prefetch folder

Acquiring data from pagefile, thumbnails and raw disk fragments

Acquiring data from binary files and process memory dump

Acquiring data from e-mail files

Acquiring user’s browsing history

Discovering web search queries

Examining remote host’s availability over LAN

Checking e-mail’s deliverability and analyzing recipient’s data

Creating and installing a keylogger

Building custom tools to analyze system security

Taking over a remote computer

Restricting access to chosen websites and computers

Using WMI console for acquiring and analyzing evidence

Using DNS cache for gathering information on visited websites

Using Sleuth Kit for acquiring data from a disk image

Recovering passwords to FTP, e-mail accounts and websites

Analyzing a corporate data leak scenario

We guarantee your 100% satisfaction or you will get your money back. You have 30 days to decide if this course is for you. You will get access to the whole system. If for any reason you’re not satisfied with your training, you will get a full refund. No questions asked.

Good luck and see you on the other side,
Andrew Harper || Hacking School Team

Who this course is for:
IT sec beginners and professionals

https://nitro.download/view/D4CE91731D397EA/IT-Surveillance-and-Computer-Forensics-from-Scratch.21.1.1.part1.rar
https://nitro.download/view/6F3D0D5E98C017E/IT-Surveillance-and-Computer-Forensics-from-Scratch.21.1.1.part2.rar
https://nitro.download/view/7A6922261CDA527/IT-Surveillance-and-Computer-Forensics-from-Scratch.21.1.1.part3.rar
https://nitro.download/view/90C6D3F4FBBDFAD/IT-Surveillance-and-Computer-Forensics-from-Scratch.21.1.1.part4.rar
https://nitro.download/view/A9E406A4B05DB1A/IT-Surveillance-and-Computer-Forensics-from-Scratch.21.1.1.part5.rar
https://nitro.download/view/D5CBF0DE1DE6CC2/IT-Surveillance-and-Computer-Forensics-from-Scratch.21.1.1.part6.rar
https://nitro.download/view/16C9210F21BA891/IT-Surveillance-and-Computer-Forensics-from-Scratch.21.1.1.part7.rar
https://nitro.download/view/20778893BA03E7F/IT-Surveillance-and-Computer-Forensics-from-Scratch.21.1.1.part8.rar

https://rapidgator.net/file/0937fa8e039331052fc6831edc39ca18/IT-Surveillance-and-Computer-Forensics-from-Scratch.21.1.1.part1.rar.html
https://rapidgator.net/file/3d3064f253e9af2061f42b82ba8bb545/IT-Surveillance-and-Computer-Forensics-from-Scratch.21.1.1.part2.rar.html
https://rapidgator.net/file/e1d55ba84c4b90ad5fe899a1dd907af7/IT-Surveillance-and-Computer-Forensics-from-Scratch.21.1.1.part3.rar.html
https://rapidgator.net/file/d359989f7566f66a9ee174b78081a374/IT-Surveillance-and-Computer-Forensics-from-Scratch.21.1.1.part4.rar.html
https://rapidgator.net/file/9face3301331cd3a265eb9cf14154959/IT-Surveillance-and-Computer-Forensics-from-Scratch.21.1.1.part5.rar.html
https://rapidgator.net/file/a4f2064c366b85c17395cf14f9cc7977/IT-Surveillance-and-Computer-Forensics-from-Scratch.21.1.1.part6.rar.html
https://rapidgator.net/file/c4eaa60a6847c2c0978b87db7a434d37/IT-Surveillance-and-Computer-Forensics-from-Scratch.21.1.1.part7.rar.html
https://rapidgator.net/file/896499e0d323e314032c81ffc7e99148/IT-Surveillance-and-Computer-Forensics-from-Scratch.21.1.1.part8.rar.html

If any links die or problem unrar, send request to
https://forms.gle/e557HbjJ5vatekDV9

Security & Hacking

← Log2Base2 Pointers [Update Links] Microsoft Azure Architect Technologies (AZ-303) | Pluralsight →

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • BBC – The Americas (2025) Part 02: Mexico
  • Pluralsight – Red Hat Certified Specialist in Linux Diagnostics and Troubleshooting (EX342)
  • Lady Camara-TENOKE
  • Udemy – LLM & Generative AI Masterclass Langchain, HuggingFace
  • The Gnomon Workshop – Virtual Makeup Design Volume 2 – Lighting & Rendering using KeyShot & Photoshop with Neville Page

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

2019 2020 2021 2022 2023 2024 Advanced AWS Azure BBC Beginners BitBook BOOKWARE Certified Cisco Cloud Comic Complete Course Data Design eBook Fundamentals Guide Hybrid iLEARN Introduction JavaScript Learn Learning LinkedIn Linux Lynda Masterclass Microsoft Packt Pluralsight Programming Python Security Skillshare Training Udemy Using XQZT

Copyright © 2025 · Equilibre on Genesis Framework · WordPress · Log in