MP4 | Video: h264, 1364x728 | Audio: AAC, 44100 Hz, 2 Ch
Language: English | Size: 1.16 GB | Duration: 5h 30m
Course at a glance
Learn how to acquire volatile and non-volatile data, using various techniques.
Dive into the structure of files and then, analyze file headers, malicious documents, and file metadata.
Become familiar with walking through partitions, recovering corrupted disks and locating hidden data.
Learn how to analyze both FAT & NTFS file systems.
Get familiar with file carving and creating your own custom carving signatures.
Learn how to analyze the Windows registry, LNK files, prefetch files and previously mounted USB devices.
Learn how to perform thorough investigations, against Skype, explorer's shellbags and Windows recycle bin.
Become proficient in forensically investigating network attacks.
This training course is for...
Security professionals, Digital investigators, and Digital Forensics examiners.
Incident Responders and Threat Hunters.
Digital Forensics Instructors and students.
Red team members who want to update their techniques, tactics, and procedures.
Screenshots
Download link:
Só visivel para registados e com resposta ao tópico.Only visible to registered and with a reply to the topic.Links are Interchangeable - No Password - Single Extraction