Introduction
  • What you will learn
Before you start
  • Get your source code package
System configuration
  • Environment Preparation
Video Training
  • Transmitting volatile evidence from an evaluated system
  • Transmitting volatile evidence from an evaluated system - part 2
  • Disk backup over the network
  • Searching data based on last access or modification timestamps
  • Analyzing the data sent by a web browser
  • Analyzing the data revealed in e-mail headers
  • Remote capturing the data about user and hardware
  • Harvesting user's IP address on message board
  • Methods of creating a partition image
  • Hiding data inside NTFS alternate data streams
  • Steganography techniques
  • Using tunneling to access firewall-protected services
  • File encryption methods and vulnerabilities
  • Recovering MS Windows user passwords
  • Analyzing run applications based on Prefetch folder
  • Acquiring data from pagefile, thumbnails and raw disk fragments
  • Acquiring data from binary files and process memory dump
  • Acquiring data from e-mail files
  • Acquiring user's browsing history
  • Discovering web search queries
  • Examining remote host's availability over LAN
  • Checking e-mail's deliverability and analyzing recipient's data
  • Creating and installing a keylogger
  • Building custom tools to analyze system security
  • Taking over a remote computer
  • Restricting access to chosen websites and computers
  • Using WMI console for acquiring and analyzing evidence
  • Using DNS cache for gathering information on visited websites
  • Using Sleuth Kit for acquiring data from a disk image
  • Recovering passwords to FTP, e-mail accounts and websites
  • Analyzing a corporate data leak scenario
Handbook: Evidence collection basics (BONUS)
  • Evidence collection basics
Handbook: Evidence left in Local Area Network and the Internet (BONUS)
  • Handbook: Evidence left in Local Area Network and the Internet (BONUS)
Handbook: Evidence left in the local system (BONUS)
  • Handbook: Evidence left in the local system (BONUS)
Rootkits and Stealth Apps: Creating and Revealing v2.0 course
  • Writing a Shellcode
BONUS Section
  • BONUS LECTURE: Learn more and get to know our other courses
  • Thank you for joining the training