IT-Forensik, Überwachungsmethoden und Datenspionage

Praktischer Kurs

3.10 (69 reviews)
Udemy
platform
Deutsch
language
Network & Security
category
IT-Forensik, Überwachungsmethoden und Datenspionage
949
students
5 hours
content
Nov 2023
last update
$19.99
regular price

What you will learn

Ethical Hacking

IT-Forensik

Überwachungsmethoden

Datenspionage

Grundlagen der Evidence Collection

Steganographietechniken

verschiedene Ethical Hacking-Techniken

Why take this course?

Letzte Aktualisierung: 11/2023


IT-Forensik, Überwachungsmethoden und Datenspionage

Praktischer Kurs


Was werden Sie lernen?

· Die Gewinnung temporärer Spuren aus MS Windows

· Die Erstellung einer Festplattenkopie innerhalb der Netzwerkumgebung

· Das Durchsuchen des Datenbestandesnach Zugriffs- oder Änderungszeit

· Die Analyse der vom Internetbrowser preisgegebenen Informationen

· Die Analyse der in E-Mails preisgegebenen Informationen

· Informationsgewinnung über Benutzer und Hardware per Fernzugriff

· Die Ermittlung der IP-Adresse eines Forumsbenutzers über Fernzugriff

· Methoden zum Erstellen von Partitionsabbildern

· Das Verstecken von Daten in alternativen NTFS-Datenströmen

· Techniken der Steganographie

· Die Verwendung des Tunneling zum Umgehen von Verbindungssperren

· Datenverschlüsselungsmethoden und deren Unzulänglichkeiten

· Das Wiederherstellen und Zurücksetzen von Passwörtern in MS Windows-Konten

· Die Analyse der gestarteten Anwendungen anhand des Prefetch-Inhalts

· Datengewinnung aus Paging-Dateien, Miniaturen und Festplattenfragmenten

· Datengewinnung aus Binärdateien und dem Dump des Prozessspeichers

· Datengewinnung aus Dateien der Mailprogramme

· Zusammenstellung von Listen der besuchten WWW-Seiten

· Die Analyse der an Google gerichteten Anfragen

· Die Untersuchung der im LAN verfügbaren Rechner

· Die Überprüfung des Email-Empfangs und die Analyse der Empfängerdaten

· Die Installation eines Keyloggers im System

· Das Erstellen eigener Werkzeuge für die Sicherheitsanalyse

· Die Remote-Kontrolle des Computers

· Die Verwendung der WMI-Konsole zur Indiziensammlung

· Einrichtung von Zugriffsbeschränkungen

· Die Verwendung des DNS-Cache zur Analyse besuchter WWW-Seiten

· Die Verwendung des Sleuth Kit-Tools

· Die Wiederherstellung von FTP-, WWW- und Mail-Passwörtern

· Die Analyse eines Datenlecks auf einem Firmencomputer

Screenshots

IT-Forensik, Überwachungsmethoden und Datenspionage - Screenshot_01IT-Forensik, Überwachungsmethoden und Datenspionage - Screenshot_02IT-Forensik, Überwachungsmethoden und Datenspionage - Screenshot_03IT-Forensik, Überwachungsmethoden und Datenspionage - Screenshot_04

Our review

🏅 **Overall Course Rating:** 3.10 **Course Overview and Content:** The course offers insightful content, which is appreciated by the majority of reviewers. It covers a range of topics suitable for individuals looking to understand both Windows and Linux systems from a programming perspective. However, the course presentation style is monotonous and can often leave learners wondering about the purpose and application of certain scripts or commands. **Pros:** - **Interesting Insights:** The content of the course is valuable for those interested in gaining knowledge about both Windows and Linux systems. - **Applicable to Various Levels:** Despite issues with accessibility for beginners, more experienced users found the material superb for learning essential aspects of Windows and Linux hergabe. - **Comprehensive:** The course is considered comprehensive and covers a wide range of topics within its scope. **Cons:** - **Monotone Presentation:** The delivery of content is monotonous, which can make it difficult to stay engaged. - **Lack of Basic Explanations:** There is an absence of introductory explanations for beginners, making the course inaccessible for those new to programming or the subject matter. - **Language Switching:** The course starts in German and switches to English, which may confuse learners and detract from professional delivery. - **Unclear Instructions and Explanations:** Some reviewers found the instructions and explanations given to be insufficient, with many asking why certain commands are used or how they fit into larger contexts. - **Poor Structure and Lack of Clarity:** The course lacks clear structure and coherent progression, making it difficult for learners to follow along and understand the material. - **Inadequate Visual Aids and Examples:** Reviewers pointed out that the course could greatly benefit from more visual aids and examples to clarify complex concepts. - **Customer Support Issues:** Some users reported not receiving responses to their queries, which negatively impacted their learning experience. - **Language and Technical Accuracy:** The German voiceover for the course was criticized as sounding robotic and making errors in translation, which detracts from the learning process. **Additional Notes:** - **Inconsistent Quality in Content Delivery:** Some users mentioned that the instructor appeared to speak without a clear structure or purpose, which made following the course more challenging. - **Outdated or Uncompatible Code Examples:** One reviewer noted that the code provided was not compatible with the latest software versions, which could be a concern for learners looking to apply their new skills in a current environment. **Recommendation:** Despite some significant drawbacks in terms of presentation and structure, the course content is valuable for those who can navigate past these issues. Learners with prior knowledge in informatics and programming may still find this course beneficial, but it is not recommended for beginners or those seeking a structured learning path. It is advisable to consider other courses that offer clearer explanations, better structure, and comprehensive support to enhance your understanding of Windows and Linux systems.

Charts

Price

IT-Forensik, Überwachungsmethoden und Datenspionage - Price chart

Rating

IT-Forensik, Überwachungsmethoden und Datenspionage - Ratings chart

Enrollment distribution

IT-Forensik, Überwachungsmethoden und Datenspionage - Distribution chart
2292553
udemy ID
3/26/2019
course created date
10/29/2019
course indexed date
Bot
course submited by