وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

IFCI Expert Cybercrime Investigator’s Course

سرفصل های دوره

Protect your network - Put cybercriminals in jail. Learn computer forensics, malware analysis and hacker investigations.


01 - Computer Forensics Core Concepts
  • 001 The World of Cybercrime Investigation
  • 002 Subfields of Computer Forensics
  • 003 Roles and Responsibilities of the Cybercrime Investigator
  • 004 Computer Forensic Tools and Testing
  • 005 Sources of Digital Evidence
  • 006 Home Computer Setup for IFCI Labs
      Forensic Image FINAL
    • desktop.zip
    • vader home computer.zip
    • vader home computer.001.zip
      IFCI CCICF Lab 1 - Hashing
    • Lab 1 - Hashing.pdf
    • desktop.zip
    • hashcalc setup.zip
    • hxd setup.zip
      IFCI CCICF Lab 2 - Forensic Acquisition
    • Lab 2 - Forensic Imaging.pdf
    • accessdata ftk imager 3.1.4.zip
    • desktop.zip
    • dumpit.zip
      IFCI CCICF Lab 3 - Deleted File Recovery
    • Lab 3 - Deleted File Recovery.pdf
    • desktop.zip
    • suspect floppy image.zip
    • suspect floppy image - copy.zip
      IFCI CCICF Lab 4 - Email Analysis
    • Lab 4- Email analysis.pdf
    • desktop.zip
        MailView
      • desktop.zip
      • localization.zip
      • mailview.zip
      • mailviewer.cs.zip
      • mailviewer.de.zip
      • mailviewer.el.zip
      • mailviewer.en.zip
      • mailviewer.es.zip
      • mailviewer.fr.zip
      • mailviewer.hu.zip
      • mailviewer.it.zip
      • mailviewer.nl.zip
      • mailviewer.pl.zip
      • mailviewer.ru.zip
      • mailviewer.sk.zip
      • mailviewer.sv.zip
      • mailviewer.tr.zip
      • mailviewer.zh.zip
      • mailviewer.pt br.zip
      • mailviewer.zh-tw.zip
      IFCI CCICF Lab 5 - Internet Activity Analysis
    • Lab 5- Internet Activity Analysis.pdf
    • desktop.zip
        browsinghistoryview
      • browsinghistoryview.zip
      • desktop.zip
      • readme.zip
        browsinghistoryview-x64
      • browsinghistoryview.zip
      • desktop.zip
      • readme.zip
      IFCI CCICF Lab 6 - Recycle Bin Analysis
    • Lab 6 - Recycle Bin Analysis.pdf
    • desktop.zip
        WFA
      • desktop.zip
      • wfa.zip
      IFCI CCICF Lab 7 - Link File Analysis
    • IFCI CCICF Lab 7 - Link File Analysis.pdf
    • desktop.zip
        WFA
      • desktop.zip
      • wfa.zip
      IFCI CCICF Lab 8 - Prefetch File Analysis
    • Lab 8 - Prefetch File Analysis.pdf
    • desktop.zip
    • winprefetchview.zip
      IFCI CCICF Lab 9 - Signature Analysis
    • IFCI CCIF Lab 9 - Signature Analysis.docx
    • Lab 9 - Signature Analysis.pdf
    • Wikipedia List of file signatures.pdf
    • desktop.zip
    • hxd setup.zip
      IFCI CCICF Lab 10 - Exif Data Analysis
    • IFCI CCIF Lab 10 - Exif Data Analysis.docx
    • Lab 10 - Exif Data Analysis.pdf
    • desktop.zip
    • exifread.zip
      IFCI CCICF Lab 11 - Event Log Analysis
    • Lab 11 - Event Log Analysis.pdf
    • desktop.zip
        elex
      • desktop.zip
      • elex setup.zip
      • file id.zip
      • whatsnew.zip
      IFCI CCICF Lab 12 - Registry Analysis
    • CCICF Lab 12 - Registry Analysis.docx
    • Lab 12 - Registry Analysis.pdf
    • desktop.zip
        Registry Browser 3
      • desktop.zip
      • registrybrowser x86 v3-11a.zip
      IFCI CCICF Lab 13 - Domain Investigation
    • Lab 13 - Domain investigations.pdf
    • desktop.zip
      IFCI CCICF Lab 14 - Volatile Memory Analysis
    • Lab 14 - Volatile Memory Analysis.pdf
    • desktop.zip
    • silentbanker.zip
    • vader home computer.zip
    • volatility-2.3.1.standalone.zip
      IFCI CCICF Lab 15 - Dynamic Malware Analysis --DEMO
    • Lab 15 - Malware Analysis Demo.pdf
    • desktop.zip

  • 02 - Forensic Acquisitions Theory & Practice
  • 001 Incident Response Triage and Forensic Acquisitons
  • 002 Hashes - Digital Fingerprints
  • 003 Lab1 - Hashing
  • 004 Incident Responders Forensic Acquisition Process
  • 005 Different Approaches to Forensic Acquisition
  • 006 Volatile Memory Acquisition
  • 007 Lab2 - Forensic Acquisition Lab

  • 03 - File Systems, Data Structures, and File Deletion Recovery
  • 001 Introduction to File Systems and Operating Systems
  • 002 Data Structures
  • 003 Slack Space and Deleted Files
  • 004 File System Limitations
  • 005 FAT File Systems
  • 006 NTFS File Systems
  • 007 File Carving and File Fragmentation
  • 008 Lab 3 Deleted File Recovery

  • 04 - Email & Internet History Analysis
  • 001 Email Analysis
  • 002 Host and Web Based Email Extraction
  • 003 Email Header Analyisis and Base64 Encoding
  • 004 LAB 4 - Email Analysis
  • 005 Internet Activity Analysis Introduction
  • 006 Chrome and Firefox Analysis
  • 007 Internet Explorer Analysis
  • 008 Cookies, Cache, and IE Artifacts
  • 009 URL Obfuscation
  • 010 LAB 5 - Internet Activity Analysis

  • 05 - Windows System Forensic Artifacts - Part 1
  • 001 Timeline Analysis
  • 002 Time Zone Issues
  • 003 Time Stamps
  • 004 Non-Standard Timestamps and Timeline Antiforensics
  • 005 MAC Time Triangulation
  • 006 User Attribution and Analysis
  • 007 Recycle Bin Analysis
  • 008 Lab 6 - Recycle Bin Analysis
  • 009 Link File Analysis
  • 010 Other Locations of Interest
  • 011 Lab 7 - Link File Analysis

  • 06 - Windows System Forensic Artifacts Part 2 and File Signature Analysis
  • 001 Thumbs.db and Thumbcache Analysis
  • 002 Prefetch File Analysis
  • 003 Lab 8 - Prefetch File Analysis
  • 004 Persistent RAM Files and System Restore Functions
  • 005 File Signature Analysis
  • 006 Lab 9 - File Signature Analysis
  • 007 Metadata Analysis
  • 008 Exif Data Analysis
  • 009 Lab 10 - Exif Data Analysis

  • 07 - Module 7 - Windows System Logs & Registry Analysis
  • 001 Windows Log Analysis
  • 002 System and Application Event Log Analysis
  • 003 Security Event Log Analysis
  • 004 Dr Watson Logs
  • 005 Lab 11 - Event Log Analysis
  • 006 Introduction to the Windows Registry
  • 007 Registry Analysis -USB Devices
  • 008 Registry Analysis - NTUser.dat - Part 1
  • 009 Registry Analysis - NTUser.dat - Part 2
  • 010 Registry Analysis - Autostarts
  • 011 Lab 12 - Registry Analysis

  • 08 - Introduction to Malware and Network Intrusions
  • 001 The Hacking Process
  • 002 Hacker Motivations
  • 003 Hacker Strategies
  • 004 Botnet Investigations
  • 005 Drive-by Downloads
  • 006 Malware Propagation
  • 007 Polymorphism and Packers
  • 008 Social Engineering
  • 009 Rootkits

  • 09 - Network Data Analysis
  • 001 Network Data Evidence and IP Addressing
  • 002 TCP and UDP Communication Protocols
  • 003 Network Communication and Ports
  • 004 HTTP Analysis and DNS Poisioning
  • 005 Network Scanners and Sniffers

  • 10 - Cybercrime, Cyber Terror, & Cyber Espionage Investigations
  • 001 The Blurred Lines Between Cybercrime, Cyberwar, and Cyberespionage
  • 002 The Intersection of Cybercrime and Cyberwar
  • 003 Russian Organized Cybercrime
  • 004 Supply Chain Interdiction
  • 005 Criminal Domain Investigations
  • 006 Domain and IP Address Investigation Tools
  • 007 Lab 13 - Criminal Domain Investigations
  • 008 Stuxnet
  • 009 Point of Sale Server Attacks
  • 010 Point of Sale Server- Malware
  • 011 Point of Sale Server- Exfiltration
  • 012 Point of Sale Server- Advanced Investigative Techniques

  • 11 - Volatile Memory Analysis
  • 001 Volatile Memory Analysis Introduction
  • 002 Volatility Introduction
  • 003 Analyzing ZeuS Malware with Volatility
  • 004 Malware Analysis Using Volatility - Part 1
  • 005 Malware Analysis Using Volatility - Part 2
  • 006 Volatility - Advanced Capabilities
  • 007 Lab 14 1 Volatile Memory Analysis of IRC Malware and VNC Attack
  • 008 Lab 14 2 Volatile Memory Analysis of SilentBanker Malware

  • 12 - Dynamic Malware Analysis
  • 001 Introduction to Dynamic Malware Analysis
  • 002 Virtual Malware Analysis Environment Setup - Part 1
  • 003 Virtual Malware Analysis Environment Setup - Part 2
  • 004 IRC Malware Analysis - Part 1
  • 005 IRC Malware Analysis - Part 2
  • 006 Lab 15 - Basic Malware Analysis - IRC Bot
  • 007 Lab 16-1 Advanced Malware Analysis - Rootkits
  • 008 Lab 16-2 Advanced Malware Analysis - Rootkits
  • 009 Lab 16-3 Advanced Malware Analyis - Rootkits
  • 010 Lab 16-4 Advanced Malware Analysis - Rootkits

  • 13 - IFCI Course - Wrapup
  • 001 IFCI Course Review
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 10686
    حجم: 5032 مگابایت
    مدت زمان: 964 دقیقه
    تاریخ انتشار: 8 اردیبهشت 1402
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید