IT Surveillance and Computer Forensics from Scratch HACKING+

Surveillance Methods and Computer Forensics Basics - 101 Video Training with PDFs. Practical Ethical Hacking techniques.

3.40 (505 reviews)
Udemy
platform
English
language
Network & Security
category
instructor
IT Surveillance and Computer Forensics from Scratch HACKING+
7,054
students
9 hours
content
Nov 2023
last update
$54.99
regular price

What you will learn

IT Surveillance Methods

Computer Forensics from Scratch

30+ TRAINING VIDEO TUTORIALS

Source code package ready for download

Evidence collection basics

Evidence left in LAN and the Internet

Evidence left in the local system

Unethical hacking: Risks

Restricting access

Taking over a remote computer

Acquiring data from different sources

Steganography techniques

Why take this course?

LAST UPDATED: 11/2023

Welcome to Hacking School!
Ethical Hacking Unleashed

IT Surveillance and Computer Forensics from Scratch HACKING+

Surveillance Methods and Computer Forensics Basics - 101 Video Training with PDFs. Practical Ethical Hacking techniques.

Before we begin: the practical use of the course you are going to see has been proven by thousands of people all over the world – beginners and computer geeks as well. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we'd like to share with you.

What you can expect from this course and what you will learn: 

  • You will get over 30 lectures and 7+ hours of content!

  • You will get free source code package to download


What you will learn:

  • Transmitting volatile evidence from an evaluated system

  • Disk backup over the network

  • Searching data based on last access or modification timestamps

  • Analyzing the data sent by a web browser

  • Analyzing the data revealed in e-mail headers

  • Remote capturing the data about user and hardware 

  • Harvesting user's IP address on message board

  • Methods of creating a partition image 

  • Hiding data inside NTFS alternate data streams 

  • Steganography techniques 

  • Using tunneling to access firewall-protected services 

  • File encryption methods and vulnerabilities 

  • Recovering MS Windows user passwords 

  • Analyzing run applications based on Prefetch folder 

  • Acquiring data from pagefile, thumbnails and raw disk fragments 

  • Acquiring data from binary files and process memory dump 

  • Acquiring data from e-mail files 

  • Acquiring user's browsing history 

  • Discovering web search queries 

  • Examining remote host's availability over LAN 

  • Checking e-mail's deliverability and analyzing recipient's data 

  • Creating and installing a keylogger 

  • Building custom tools to analyze system security 

  • Taking over a remote computer 

  • Restricting access to chosen websites and computers 

  • Using WMI console for acquiring and analyzing evidence 

  • Using DNS cache for gathering information on visited websites 

  • Using Sleuth Kit for acquiring data from a disk image 

  • Recovering passwords to FTP, e-mail accounts and websites

  • Analyzing a corporate data leak scenario


We guarantee your 100% satisfaction or you will get your money back. You have 30 days to decide if this course is for you. You will get access to the whole system. If for any reason you're not satisfied with your training, you will get a full refund. No questions asked.   


Good luck and see you on the other side,
Andrew Harper || Hacking School Team

Screenshots

IT Surveillance and Computer Forensics from Scratch HACKING+ - Screenshot_01IT Surveillance and Computer Forensics from Scratch HACKING+ - Screenshot_02IT Surveillance and Computer Forensics from Scratch HACKING+ - Screenshot_03IT Surveillance and Computer Forensics from Scratch HACKING+ - Screenshot_04

Reviews

Misbah
December 27, 2023
Very satisfying, complete with the theory in the handbook to try, the explanation is also very good & detailed.
Carlos
December 18, 2023
Outdated, the process is not shown step by step (the student has to figure out by her/himself), the curse needs to be updated or taken down and the money refund to those like me who had paid for it.
Viann
August 27, 2017
For me, just letting the course play through, especially when you not familiar with some of the commands it moves pretty quickly, lots of very useful information, had to stop replay several times (which I am very grateful for the ability to do so) so that I could retain what I was hearing & seeing.
Vincent
January 17, 2017
Heavy duty information. Good instruction. I'll definitely be going over this course again and again. Thanks!
Jennifer
January 8, 2017
Would be a great course if they explained the code. Basic code knowledge is needed in order to be successful.
Lorenzo
December 20, 2016
Very informative and a good reference for anyone trying to get started with computer forensics and security. The scripts and code included in the lesson are great, but not enough time is spent explaining how they work (the code, that is, not the actual function), where they came from, or what risks they may pose in the hands of someone who doesn't know how to vet them. Secondly, the lessons don't really engage the student and don't provide exercises/projects to get some "hand on" experience. As it is, there are a lot of demonstrations and examples, but not much in the way of things for the student to do other than watch and listen. For these reasons, I deduct 2 stars. I'll revise this review if some more attention is given to explaining the scripts and code rather than assuming they work and are safe. Also, some practical exercises for the student to work on (rather than just demonstrated examples) would go a long way to engaging the student and will help with getting some "hands on" experience. In the end, it gets 3 stars for providing a wealth of information and a good foundation on the subject.
Abraham
July 29, 2016
You provide great source codes, but you just execute them and show the results, it would be much better if you explain the codes, bat and cpp line by line, so we can create our own forensic utilities, I don't like to see only the final result, I like to understand and you only give some tricks
Brad
July 1, 2016
Almost perfect except the pronunciation of route as root, which is inaccurate. Overall teh material is spot on and at a quick pace.
Bruce
May 5, 2016
This is a mix of basic and quite advanced. I would like some more explanations of some of the scripts used. Instead of a human voice they have used a robot reader, which is slightly annoying.
Thomas
April 1, 2016
This is by far, the worst course in IT I have ever taken. In fact, I could only stomach the first 2 videos. I am now doing what I can to get a refund for this abysmal course.
Chris
March 20, 2016
Excellent course. Could not set all the environment info, but found watching the videos and following along as best I could as a great way to get my feet wet. I'm growing my career and found this to be a great overview of some standard methods.
Jim
March 12, 2016
This last video showed an ipconfig command being piped to find /i "address". This was pretty cool. Hadn't seen ipconfig used that way before. Piping the output into other commands isn't new. Just hadn't seen it done this way.
Marvin
March 8, 2016
Course expects you to have Windows. I don't recall that disclosed as a prerequisite. Also expects you to have an IDE and a custom Slax install but glosses over those very quickly. Presenter continually rattles off long commands you are expected to type, then erases them. You would have to pause the video every few seconds and MANUALLY COPY the commands to someplace for future reference. All in all it sounds like he is reading you a book when instead you need the actual book for future reference. It dives right in with no context and is virtually useless unless you already know the material.
Patrick
January 20, 2016
I would have given the course five stars, except the files used where not organized by lecture titles. Out side of that it was very informative.
Peter
January 15, 2016
The material is there but the way in which it is presented leaves much to be desired. It assumes previous knowledge of the selected IDE environment. The way in which it the subjects are taught are brief in the extreme and would be more suited to students who had previously covered this area and required a quick brush up course. Could be greatly improved by the inclusion of a well designed overview as lecture one.

Charts

Price

IT Surveillance and Computer Forensics from Scratch HACKING+ - Price chart

Rating

IT Surveillance and Computer Forensics from Scratch HACKING+ - Ratings chart

Enrollment distribution

IT Surveillance and Computer Forensics from Scratch HACKING+ - Distribution chart

Related Topics

702242
udemy ID
12/20/2015
course created date
11/20/2019
course indexed date
Bot
course submited by