وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
1

IFCI Expert Cybercrime Investigator’s Course

سرفصل های دوره

Protect your network - Put cybercriminals in jail. Learn computer forensics, malware analysis and hacker investigations.


01 - Computer Forensics Core Concepts
  • 001 The World of Cybercrime Investigation
  • 002 Subfields of Computer Forensics
  • 003 Roles and Responsibilities of the Cybercrime Investigator
  • 004 Computer Forensic Tools and Testing
  • 005 Sources of Digital Evidence
  • 006 Home Computer Setup for IFCI Labs
      Forensic Image FINAL
    • desktop.zip
    • vader home computer.zip
    • vader home computer.001.zip
      IFCI CCICF Lab 1 - Hashing
    • Lab 1 - Hashing.pdf
    • desktop.zip
    • hashcalc setup.zip
    • hxd setup.zip
      IFCI CCICF Lab 2 - Forensic Acquisition
    • Lab 2 - Forensic Imaging.pdf
    • accessdata ftk imager 3.1.4.zip
    • desktop.zip
    • dumpit.zip
      IFCI CCICF Lab 3 - Deleted File Recovery
    • Lab 3 - Deleted File Recovery.pdf
    • desktop.zip
    • suspect floppy image.zip
    • suspect floppy image - copy.zip
      IFCI CCICF Lab 4 - Email Analysis
    • Lab 4- Email analysis.pdf
    • desktop.zip
        MailView
      • desktop.zip
      • localization.zip
      • mailview.zip
      • mailviewer.cs.zip
      • mailviewer.de.zip
      • mailviewer.el.zip
      • mailviewer.en.zip
      • mailviewer.es.zip
      • mailviewer.fr.zip
      • mailviewer.hu.zip
      • mailviewer.it.zip
      • mailviewer.nl.zip
      • mailviewer.pl.zip
      • mailviewer.ru.zip
      • mailviewer.sk.zip
      • mailviewer.sv.zip
      • mailviewer.tr.zip
      • mailviewer.zh.zip
      • mailviewer.pt br.zip
      • mailviewer.zh-tw.zip
      IFCI CCICF Lab 5 - Internet Activity Analysis
    • Lab 5- Internet Activity Analysis.pdf
    • desktop.zip
        browsinghistoryview
      • browsinghistoryview.zip
      • desktop.zip
      • readme.zip
        browsinghistoryview-x64
      • browsinghistoryview.zip
      • desktop.zip
      • readme.zip
      IFCI CCICF Lab 6 - Recycle Bin Analysis
    • Lab 6 - Recycle Bin Analysis.pdf
    • desktop.zip
        WFA
      • desktop.zip
      • wfa.zip
      IFCI CCICF Lab 7 - Link File Analysis
    • IFCI CCICF Lab 7 - Link File Analysis.pdf
    • desktop.zip
        WFA
      • desktop.zip
      • wfa.zip
      IFCI CCICF Lab 8 - Prefetch File Analysis
    • Lab 8 - Prefetch File Analysis.pdf
    • desktop.zip
    • winprefetchview.zip
      IFCI CCICF Lab 9 - Signature Analysis
    • IFCI CCIF Lab 9 - Signature Analysis.docx
    • Lab 9 - Signature Analysis.pdf
    • Wikipedia List of file signatures.pdf
    • desktop.zip
    • hxd setup.zip
      IFCI CCICF Lab 10 - Exif Data Analysis
    • IFCI CCIF Lab 10 - Exif Data Analysis.docx
    • Lab 10 - Exif Data Analysis.pdf
    • desktop.zip
    • exifread.zip
      IFCI CCICF Lab 11 - Event Log Analysis
    • Lab 11 - Event Log Analysis.pdf
    • desktop.zip
        elex
      • desktop.zip
      • elex setup.zip
      • file id.zip
      • whatsnew.zip
      IFCI CCICF Lab 12 - Registry Analysis
    • CCICF Lab 12 - Registry Analysis.docx
    • Lab 12 - Registry Analysis.pdf
    • desktop.zip
        Registry Browser 3
      • desktop.zip
      • registrybrowser x86 v3-11a.zip
      IFCI CCICF Lab 13 - Domain Investigation
    • Lab 13 - Domain investigations.pdf
    • desktop.zip
      IFCI CCICF Lab 14 - Volatile Memory Analysis
    • Lab 14 - Volatile Memory Analysis.pdf
    • desktop.zip
    • silentbanker.zip
    • vader home computer.zip
    • volatility-2.3.1.standalone.zip
      IFCI CCICF Lab 15 - Dynamic Malware Analysis --DEMO
    • Lab 15 - Malware Analysis Demo.pdf
    • desktop.zip

  • 02 - Forensic Acquisitions Theory & Practice
  • 001 Incident Response Triage and Forensic Acquisitons
  • 002 Hashes - Digital Fingerprints
  • 003 Lab1 - Hashing
  • 004 Incident Responders Forensic Acquisition Process
  • 005 Different Approaches to Forensic Acquisition
  • 006 Volatile Memory Acquisition
  • 007 Lab2 - Forensic Acquisition Lab

  • 03 - File Systems, Data Structures, and File Deletion Recovery
  • 001 Introduction to File Systems and Operating Systems
  • 002 Data Structures
  • 003 Slack Space and Deleted Files
  • 004 File System Limitations
  • 005 FAT File Systems
  • 006 NTFS File Systems
  • 007 File Carving and File Fragmentation
  • 008 Lab 3 Deleted File Recovery

  • 04 - Email & Internet History Analysis
  • 001 Email Analysis
  • 002 Host and Web Based Email Extraction
  • 003 Email Header Analyisis and Base64 Encoding
  • 004 LAB 4 - Email Analysis
  • 005 Internet Activity Analysis Introduction
  • 006 Chrome and Firefox Analysis
  • 007 Internet Explorer Analysis
  • 008 Cookies, Cache, and IE Artifacts
  • 009 URL Obfuscation
  • 010 LAB 5 - Internet Activity Analysis

  • 05 - Windows System Forensic Artifacts - Part 1
  • 001 Timeline Analysis
  • 002 Time Zone Issues
  • 003 Time Stamps
  • 004 Non-Standard Timestamps and Timeline Antiforensics
  • 005 MAC Time Triangulation
  • 006 User Attribution and Analysis
  • 007 Recycle Bin Analysis
  • 008 Lab 6 - Recycle Bin Analysis
  • 009 Link File Analysis
  • 010 Other Locations of Interest
  • 011 Lab 7 - Link File Analysis

  • 06 - Windows System Forensic Artifacts Part 2 and File Signature Analysis
  • 001 Thumbs.db and Thumbcache Analysis
  • 002 Prefetch File Analysis
  • 003 Lab 8 - Prefetch File Analysis
  • 004 Persistent RAM Files and System Restore Functions
  • 005 File Signature Analysis
  • 006 Lab 9 - File Signature Analysis
  • 007 Metadata Analysis
  • 008 Exif Data Analysis
  • 009 Lab 10 - Exif Data Analysis

  • 07 - Module 7 - Windows System Logs & Registry Analysis
  • 001 Windows Log Analysis
  • 002 System and Application Event Log Analysis
  • 003 Security Event Log Analysis
  • 004 Dr Watson Logs
  • 005 Lab 11 - Event Log Analysis
  • 006 Introduction to the Windows Registry
  • 007 Registry Analysis -USB Devices
  • 008 Registry Analysis - NTUser.dat - Part 1
  • 009 Registry Analysis - NTUser.dat - Part 2
  • 010 Registry Analysis - Autostarts
  • 011 Lab 12 - Registry Analysis

  • 08 - Introduction to Malware and Network Intrusions
  • 001 The Hacking Process
  • 002 Hacker Motivations
  • 003 Hacker Strategies
  • 004 Botnet Investigations
  • 005 Drive-by Downloads
  • 006 Malware Propagation
  • 007 Polymorphism and Packers
  • 008 Social Engineering
  • 009 Rootkits

  • 09 - Network Data Analysis
  • 001 Network Data Evidence and IP Addressing
  • 002 TCP and UDP Communication Protocols
  • 003 Network Communication and Ports
  • 004 HTTP Analysis and DNS Poisioning
  • 005 Network Scanners and Sniffers

  • 10 - Cybercrime, Cyber Terror, & Cyber Espionage Investigations
  • 001 The Blurred Lines Between Cybercrime, Cyberwar, and Cyberespionage
  • 002 The Intersection of Cybercrime and Cyberwar
  • 003 Russian Organized Cybercrime
  • 004 Supply Chain Interdiction
  • 005 Criminal Domain Investigations
  • 006 Domain and IP Address Investigation Tools
  • 007 Lab 13 - Criminal Domain Investigations
  • 008 Stuxnet
  • 009 Point of Sale Server Attacks
  • 010 Point of Sale Server- Malware
  • 011 Point of Sale Server- Exfiltration
  • 012 Point of Sale Server- Advanced Investigative Techniques

  • 11 - Volatile Memory Analysis
  • 001 Volatile Memory Analysis Introduction
  • 002 Volatility Introduction
  • 003 Analyzing ZeuS Malware with Volatility
  • 004 Malware Analysis Using Volatility - Part 1
  • 005 Malware Analysis Using Volatility - Part 2
  • 006 Volatility - Advanced Capabilities
  • 007 Lab 14 1 Volatile Memory Analysis of IRC Malware and VNC Attack
  • 008 Lab 14 2 Volatile Memory Analysis of SilentBanker Malware

  • 12 - Dynamic Malware Analysis
  • 001 Introduction to Dynamic Malware Analysis
  • 002 Virtual Malware Analysis Environment Setup - Part 1
  • 003 Virtual Malware Analysis Environment Setup - Part 2
  • 004 IRC Malware Analysis - Part 1
  • 005 IRC Malware Analysis - Part 2
  • 006 Lab 15 - Basic Malware Analysis - IRC Bot
  • 007 Lab 16-1 Advanced Malware Analysis - Rootkits
  • 008 Lab 16-2 Advanced Malware Analysis - Rootkits
  • 009 Lab 16-3 Advanced Malware Analyis - Rootkits
  • 010 Lab 16-4 Advanced Malware Analysis - Rootkits

  • 13 - IFCI Course - Wrapup
  • 001 IFCI Course Review
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 10686
    حجم: 5032 مگابایت
    مدت زمان: 964 دقیقه
    تاریخ انتشار: ۸ اردیبهشت ۱۴۰۲
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید