وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Digital Forensics and Computer Examiner Training

سرفصل های دوره

1.Digital Forensics Introduction
  • 1.Can we explain digital forensics 1C30C
  • 2.Artifacts1C30C
  • 3.Who are we investigating for 1C30C
  • 4.What tools do we use 1C30C
  • 5.Outside considerations1C30C
  • 6.Ethical Considerations1C30C
  • 7.Hands-On Lab or Other Video1C30C
  • 8.Hands-On Lab or Other Video1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • saved url-.txt
  • saved url-Digital Forensics Warrant Example.txt
  • saved url-Identifying and Avoiding Bias in Research.txt
  • saved url-RAM Disk in Windows 7.txt

  • 2.Federal Rules of Evidence
  • 1.Overview1C30C
  • 2.Federal Rules of Evidence1C30C
  • 3.Daubert Standard1C30C
  • 4.Rule 7021C30C
  • 5.Rule 7011C30C
  • 6.Rule 9011C30C
  • 7.Rule 9021C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • saved url-Erik Choron.txt

  • 3.Chain of Custody
  • 1.Ensuring Chain of Custody1C30C
  • 2.Documentation1C30C
  • 3.Bag it and tag it1C30C
  • 4.1C30C
  • 5.But what about digital evidence bags 1C30C
  • 6.Secure Storage1C30C
  • 7.Challenge1C30C
  • 8.Hands-On Lab or Other Video1C30C
  • 9.Hands-On Lab or Other Video1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • basic types of evidence collection bags.zip
  • detailed look at the bag in the video.zip
  • electrostatic discharge (esd) evidence bag example.zip
  • my evidence collection bag.zip

  • 4.Software Loadout
  • 1.Identify those software needs1C30C
  • 2.Virtualization1C30C
  • 3.Investigation Software1C30C
  • 4.Specific Case Software (inside and outside the Operating System)1C30C
  • 5.Challenge1C30C
  • 6.Hands-On Lab or Other Video1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • saved url-Autopsy Download.txt
  • saved url-DiskDrill.txt
  • saved url-EnCase.txt
  • saved url-FTK Download.txt
  • saved url-NIST Software and Systems Division Products.txt
  • saved url-NIST Windows Registry documentation.txt
  • saved url-VMWare Workstation Pro 17.txt
  • saved url-VirtualBox Download.txt

  • 5.Installing and Configuring Kali
  • 1.What is Kali 1C30C
  • 2.Picking our Kali1C30C
  • 3.Downloading and installing Kali1C30C
  • 4.Live Kali1C30C
  • 5.Challenge1C30C
  • 6.Hands-On Lab or Other Video1C30C
  • 7.Hands-On Lab or Other Video1C30C
  • 8.Hands-On Lab or Other Video1C30C
  • 9.Hands-On Lab or Other Video1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • saved url-Full List of Kali Tools.txt
  • saved url-Kali Download.txt
  • saved url-U.S. v. Matthew Keys (2016).txt

  • 6.Monitoring with Kali
  • 1.Kali being used for good1C30C
  • 2.Monitoring and discovering networks1C30C
  • 3.Monitoring for hidden networks1C30C
  • 4.Challenge1C30C
  • 5.Hands-On Lab or Other Video1C30C
  • 6.Hands-On Lab or Other Video1C30C
  • 7.Hands-On Lab or Other Video1C30C
  • 8.Hands-On Lab or Other Video1C30C
  • 9.Hands-On Lab or Other Video1C30C
  • 10.Hands-On Lab or Other Video1C30C
  • 11.Hands-On Lab or Other Video1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • ccna - chapter 15 - wireless.zip
  • my kali nic configuration for this skill.zip
  • saved url-.txt
  • saved url-Apple AirPort Utility.txt
  • slow scan.zip

  • 7.Metasploit Framework
  • 1.Overview1C30C
  • 2.Metasploit Framework1C30C
  • 3.Metasploit on Kali1C30C
  • 4.Systems Without Metasploit1C30C
  • 5.How to Prep the Target1C30C
  • 6.Other Metasploit Add-Ins1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • saved url-Erik Choron.txt

  • 8.Looking at the Files
  • 1.What s in a name 1C30C
  • 2.Metadata1C30C
  • 3.Alternate Data Streams1C30C
  • 4.Challenge1C30C
  • 5.Hands-On Lab or Other Video1C30C
  • 6.Hands-On Lab or Other Video1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • saved url-.txt
  • saved url-Offline Metadata tool.txt
  • saved url-Online Metadata information.txt
  • unknown.zip

  • 9.File Steganography
  • 1.File Steganography1C30C
  • 2.OpenStego1C30C
  • 3.What about finding the hidden files 1C30C
  • 4.Challenge1C30C
  • 5.Hands-On Lab or Other Video1C30C
  • 6.Hands-On Lab or Other Video1C30C
  • 7.Hands-On Lab or Other Video1C30C
  • 8.Hands-On Lab or Other Video1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • img 0975.zip
  • saved url-.txt
  • saved url-longhorn.bmp download.txt

  • 10.Digital Artifacts within Windows
  • 1.What are Artifacts 1C30C
  • 2.Artifacts within the File System1C30C
  • 3.Internet Artifacts1C30C
  • 4.Network Artifacts1C30C
  • 5.Challenge1C30C
  • 6.Hands-On Lab or Other Video1C30C
  • 7.Hands-On Lab or Other Video1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • saved url-A list of NTFS versions to their respective OS.txt
  • the ntfs version on my windows 11 system.zip

  • 11.Unallocated Artifacts within Windows
  • 1.Unallocated Artifacts within Windows1C30C
  • 2.Methods of examining Unallocated Space1C30C
  • 3.1C30C
  • 4.Automated Methods 1C30C
  • 5.But what about virtual machines 1C30C
  • 6.Extracting Unallocated Space1C30C
  • 7.Challenge1C30C
  • 8.1C30C
  • 9.Hands-On Lab or Other Video1C30C
  • 10.Hands-On Lab or Other Video1C30C
  • 11.Hands-On Lab or Other Video1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • saved url-FTK Imager download.txt
  • saved url-HxD Download.txt

  • 12.Examining Unallocated Data
  • 1.Before we begin...1C30C
  • 2.Identify Unallocated Space1C30C
  • 3.Orphans1C30C
  • 4.Recovery from Unallocated Space1C30C
  • 5.Challenge1C30C
  • 6.Hands-On Lab or Other Video1C30C
  • 7.Hands-On Lab or Other Video1C30C
  • 8.Hands-On Lab or Other Video1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • hdd examination flow chart.zip

  • 13.Examining Volatile Memory
  • 1.Volatile Memory1C30C
  • 2.Tools to extract1C30C
  • 3.Wait! Memory examination is more than just RAM1C30C
  • 4.Challenge1C30C
  • 5.Hands-On Lab or Other Video1C30C
  • 6.Hands-On Lab or Other Video1C30C
  • 7.Hands-On Lab or Other Video1C30C
  • 8.Hands-On Lab or Other Video1C30C
  • 9.Hands-On Lab or Other Video1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • saved url-Volatility Download.txt
  • saved url-dd for Windows (BETA).txt

  • 14.Learning About Our System with Volatility
  • 1.Retrieving detailed information1C30C
  • 2.How did our system connect to the Network 1C30C
  • 3.Can we look at the Registry 1C30C
  • 4.Are virtual machines any different 1C30C
  • 5.Challenge1C30C
  • 6.Hands-On Lab or Other Video1C30C
  • 7.Hands-On Lab or Other Video1C30C
  • 8.Hands-On Lab or Other Video1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • the size of our capture.zip
  • the size of our dump.zip
  • volatility command help output.zip

  • 15.Analyze RAM while Learning Volatility
  • 1.Learning Volatility1C30C
  • 2.Prepare to examine1C30C
  • 3.Installing Volatility1C30C
  • 4.Using Basic Volatility Commands1C30C
  • 5.Challenge1C30C
  • 6.1C30C
  • 7.Hands-On Lab or Other Video1C30C
  • 8.Hands-On Lab or Other Video1C30C
  • 9.Hands-On Lab or Other Video1C30C
  • 10.Hands-On Lab or Other Video1C30C
  • 11.Hands-On Lab or Other Video1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • filelist.txt
  • hash verification in kali.zip
  • output of imageinfo of our memory dump capture.zip
  • saved url-BTK Killer Case details.txt
  • saved url-Volatility Download.txt
  • this is what my hash output for md5 and sha1 looked like in powershell.zip
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 44234
    حجم: 15395 مگابایت
    مدت زمان: 670 دقیقه
    تاریخ انتشار: ۲۰ اردیبهشت ۱۴۰۴
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید