وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
3

Digital Forensics and Computer Examiner Training

سرفصل های دوره

1.Digital Forensics Introduction
  • 1.Can we explain digital forensics 1C30C
  • 2.Artifacts1C30C
  • 3.Who are we investigating for 1C30C
  • 4.What tools do we use 1C30C
  • 5.Outside considerations1C30C
  • 6.Ethical Considerations1C30C
  • 7.Hands-On Lab or Other Video1C30C
  • 8.Hands-On Lab or Other Video1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • saved url-.txt
  • saved url-Digital Forensics Warrant Example.txt
  • saved url-Identifying and Avoiding Bias in Research.txt
  • saved url-RAM Disk in Windows 7.txt

  • 2.Federal Rules of Evidence
  • 1.Overview1C30C
  • 2.Federal Rules of Evidence1C30C
  • 3.Daubert Standard1C30C
  • 4.Rule 7021C30C
  • 5.Rule 7011C30C
  • 6.Rule 9011C30C
  • 7.Rule 9021C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • saved url-Erik Choron.txt

  • 3.Chain of Custody
  • 1.Ensuring Chain of Custody1C30C
  • 2.Documentation1C30C
  • 3.Bag it and tag it1C30C
  • 4.1C30C
  • 5.But what about digital evidence bags 1C30C
  • 6.Secure Storage1C30C
  • 7.Challenge1C30C
  • 8.Hands-On Lab or Other Video1C30C
  • 9.Hands-On Lab or Other Video1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • basic types of evidence collection bags.zip
  • detailed look at the bag in the video.zip
  • electrostatic discharge (esd) evidence bag example.zip
  • my evidence collection bag.zip

  • 4.Software Loadout
  • 1.Identify those software needs1C30C
  • 2.Virtualization1C30C
  • 3.Investigation Software1C30C
  • 4.Specific Case Software (inside and outside the Operating System)1C30C
  • 5.Challenge1C30C
  • 6.Hands-On Lab or Other Video1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • saved url-Autopsy Download.txt
  • saved url-DiskDrill.txt
  • saved url-EnCase.txt
  • saved url-FTK Download.txt
  • saved url-NIST Software and Systems Division Products.txt
  • saved url-NIST Windows Registry documentation.txt
  • saved url-VMWare Workstation Pro 17.txt
  • saved url-VirtualBox Download.txt

  • 5.Installing and Configuring Kali
  • 1.What is Kali 1C30C
  • 2.Picking our Kali1C30C
  • 3.Downloading and installing Kali1C30C
  • 4.Live Kali1C30C
  • 5.Challenge1C30C
  • 6.Hands-On Lab or Other Video1C30C
  • 7.Hands-On Lab or Other Video1C30C
  • 8.Hands-On Lab or Other Video1C30C
  • 9.Hands-On Lab or Other Video1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • saved url-Full List of Kali Tools.txt
  • saved url-Kali Download.txt
  • saved url-U.S. v. Matthew Keys (2016).txt

  • 6.Monitoring with Kali
  • 1.Kali being used for good1C30C
  • 2.Monitoring and discovering networks1C30C
  • 3.Monitoring for hidden networks1C30C
  • 4.Challenge1C30C
  • 5.Hands-On Lab or Other Video1C30C
  • 6.Hands-On Lab or Other Video1C30C
  • 7.Hands-On Lab or Other Video1C30C
  • 8.Hands-On Lab or Other Video1C30C
  • 9.Hands-On Lab or Other Video1C30C
  • 10.Hands-On Lab or Other Video1C30C
  • 11.Hands-On Lab or Other Video1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • ccna - chapter 15 - wireless.zip
  • my kali nic configuration for this skill.zip
  • saved url-.txt
  • saved url-Apple AirPort Utility.txt
  • slow scan.zip

  • 7.Metasploit Framework
  • 1.Overview1C30C
  • 2.Metasploit Framework1C30C
  • 3.Metasploit on Kali1C30C
  • 4.Systems Without Metasploit1C30C
  • 5.How to Prep the Target1C30C
  • 6.Other Metasploit Add-Ins1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • saved url-Erik Choron.txt

  • 8.Looking at the Files
  • 1.What s in a name 1C30C
  • 2.Metadata1C30C
  • 3.Alternate Data Streams1C30C
  • 4.Challenge1C30C
  • 5.Hands-On Lab or Other Video1C30C
  • 6.Hands-On Lab or Other Video1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • saved url-.txt
  • saved url-Offline Metadata tool.txt
  • saved url-Online Metadata information.txt
  • unknown.zip

  • 9.File Steganography
  • 1.File Steganography1C30C
  • 2.OpenStego1C30C
  • 3.What about finding the hidden files 1C30C
  • 4.Challenge1C30C
  • 5.Hands-On Lab or Other Video1C30C
  • 6.Hands-On Lab or Other Video1C30C
  • 7.Hands-On Lab or Other Video1C30C
  • 8.Hands-On Lab or Other Video1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • img 0975.zip
  • saved url-.txt
  • saved url-longhorn.bmp download.txt

  • 10.Digital Artifacts within Windows
  • 1.What are Artifacts 1C30C
  • 2.Artifacts within the File System1C30C
  • 3.Internet Artifacts1C30C
  • 4.Network Artifacts1C30C
  • 5.Challenge1C30C
  • 6.Hands-On Lab or Other Video1C30C
  • 7.Hands-On Lab or Other Video1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • saved url-A list of NTFS versions to their respective OS.txt
  • the ntfs version on my windows 11 system.zip

  • 11.Unallocated Artifacts within Windows
  • 1.Unallocated Artifacts within Windows1C30C
  • 2.Methods of examining Unallocated Space1C30C
  • 3.1C30C
  • 4.Automated Methods 1C30C
  • 5.But what about virtual machines 1C30C
  • 6.Extracting Unallocated Space1C30C
  • 7.Challenge1C30C
  • 8.1C30C
  • 9.Hands-On Lab or Other Video1C30C
  • 10.Hands-On Lab or Other Video1C30C
  • 11.Hands-On Lab or Other Video1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • saved url-FTK Imager download.txt
  • saved url-HxD Download.txt

  • 12.Examining Unallocated Data
  • 1.Before we begin...1C30C
  • 2.Identify Unallocated Space1C30C
  • 3.Orphans1C30C
  • 4.Recovery from Unallocated Space1C30C
  • 5.Challenge1C30C
  • 6.Hands-On Lab or Other Video1C30C
  • 7.Hands-On Lab or Other Video1C30C
  • 8.Hands-On Lab or Other Video1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • hdd examination flow chart.zip

  • 13.Examining Volatile Memory
  • 1.Volatile Memory1C30C
  • 2.Tools to extract1C30C
  • 3.Wait! Memory examination is more than just RAM1C30C
  • 4.Challenge1C30C
  • 5.Hands-On Lab or Other Video1C30C
  • 6.Hands-On Lab or Other Video1C30C
  • 7.Hands-On Lab or Other Video1C30C
  • 8.Hands-On Lab or Other Video1C30C
  • 9.Hands-On Lab or Other Video1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • saved url-Volatility Download.txt
  • saved url-dd for Windows (BETA).txt

  • 14.Learning About Our System with Volatility
  • 1.Retrieving detailed information1C30C
  • 2.How did our system connect to the Network 1C30C
  • 3.Can we look at the Registry 1C30C
  • 4.Are virtual machines any different 1C30C
  • 5.Challenge1C30C
  • 6.Hands-On Lab or Other Video1C30C
  • 7.Hands-On Lab or Other Video1C30C
  • 8.Hands-On Lab or Other Video1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • the size of our capture.zip
  • the size of our dump.zip
  • volatility command help output.zip

  • 15.Analyze RAM while Learning Volatility
  • 1.Learning Volatility1C30C
  • 2.Prepare to examine1C30C
  • 3.Installing Volatility1C30C
  • 4.Using Basic Volatility Commands1C30C
  • 5.Challenge1C30C
  • 6.1C30C
  • 7.Hands-On Lab or Other Video1C30C
  • 8.Hands-On Lab or Other Video1C30C
  • 9.Hands-On Lab or Other Video1C30C
  • 10.Hands-On Lab or Other Video1C30C
  • 11.Hands-On Lab or Other Video1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • filelist.txt
  • hash verification in kali.zip
  • output of imageinfo of our memory dump capture.zip
  • saved url-BTK Killer Case details.txt
  • saved url-Volatility Download.txt
  • this is what my hash output for md5 and sha1 looked like in powershell.zip
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 44234
    حجم: 15395 مگابایت
    مدت زمان: 670 دقیقه
    تاریخ انتشار: ۲۰ اردیبهشت ۱۴۰۴
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید