IT Surveillance and Computer Forensics from Scratch HACKING+
Size: 2.93 GB

Welcome to Hacking School!
Ethical Hacking Unleashed

IT Surveillance and Computer Forensics from Scratch HACKING+

Surveillance Methods and Computer Forensics Basics – 101 Video Training with PDFs. Practical Ethical Hacking techniques.

Before we begin: the practical use of the course you are going to see has been proven by thousands of people all over the world – beginners and computer geeks as well. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we’d like to share with you.

What you can expect from this course and what you will learn: 

  • You will get over 30 lectures and 7+ hours of content!
  • You will get free source code package to download

What you will learn:

  • Transmitting volatile evidence from an evaluated system
  • Disk backup over the network
  • Searching data based on last access or modification timestamps
  • Analyzing the data sent by a web browser
  • Analyzing the data revealed in e-mail headers
  • Remote capturing the data about user and hardware 
  • Harvesting user’s IP address on message board
  • Methods of creating a partition image 
  • Hiding data inside NTFS alternate data streams 
  • Steganography techniques 
  • Using tunneling to access firewall-protected services 
  • File encryption methods and vulnerabilities 
  • Recovering MS Windows user passwords 
  • Analyzing run applications based on Prefetch folder 
  • Acquiring data from pagefile, thumbnails and raw disk fragments 
  • Acquiring data from binary files and process memory dump 
  • Acquiring data from e-mail files 
  • Acquiring user’s browsing history 
  • Discovering web search queries 
  • Examining remote host’s availability over LAN 
  • Checking e-mail’s deliverability and analyzing recipient’s data 
  • Creating and installing a keylogger 
  • Building custom tools to analyze system security 
  • Taking over a remote computer 
  • Restricting access to chosen websites and computers 
  • Using WMI console for acquiring and analyzing evidence 
  • Using DNS cache for gathering information on visited websites 
  • Using Sleuth Kit for acquiring data from a disk image 
  • Recovering passwords to FTP, e-mail accounts and websites
  • Analyzing a corporate data leak scenario

Good luck and see you on the other side,
Andrew Harper || Hacking School Team

Who this course is for:

  • IT sec beginners and professionals

What you’ll learn

  • IT Surveillance Methods
  • Computer Forensics from Scratch
  • Source code package ready for download
  • Evidence collection basics
  • Evidence left in LAN and the Internet
  • Evidence left in the local system
  • Unethical hacking: Risks
  • Restricting access
  • Taking over a remote computer
  • Acquiring data from different sources
  • Steganography techniques


How to block Zippyshare ads –

Free Download Links-

Note: Comment below if you find the download links dead and comment with fake or temporary Email-id is going to be ignored.


Leave a Reply

Your email address will not be published. Required fields are marked *