Udemy - Digital Forensics for Pentesters - Hands-on Learning

seeders: 20
leechers: 19
updated:
Added by tutsnode in Other > Tutorials

Download Fast Safe Anonymous
movies, software, shows...
  • Downloads: 144
  • Language: English

Files

Digital Forensics for Pentesters - Hands-on Learning [TutsNode.com] - Digital Forensics for Pentesters - Hands-on Learning 10 Practice What You Have learned
  • 031 Video and lab - Capture flag #3.mp4 (189.0 MB)
  • 028 Video and Lab - CTF Lab Build for HA_ Forensics.en.srt (15.2 KB)
  • 028 Video and Lab - CTF Lab Build for HA_ Forensics.mp4 (76.2 MB)
  • 029 Video and lab - Capture flag #1.en.srt (16.7 KB)
  • 029 Video and lab - Capture flag #1.mp4 (91.1 MB)
  • 030 Video and lab - Capture flag #2.en.srt (13.2 KB)
  • 030 Video and lab - Capture flag #2.mp4 (82.7 MB)
  • 031 Video and lab - Capture flag #3.en.srt (26.1 KB)
  • 032 Video and lab - Capture flag #4.en.srt (11.8 KB)
  • 032 Video and lab - Capture flag #4.mp4 (72.8 MB)
  • external-assets-links.txt (0.8 KB)
01 Course Overview
  • 001 Course Overview.en.srt (8.2 KB)
  • 001 Course Overview.mp4 (25.2 MB)
  • 001 Course-Overview-Digital-Forensics.pptx (4.6 MB)
02 Building Your Forensics Lab Environment Using VirtualBox
  • 002 Video and lab - Installing CSI Linux.en.srt (17.6 KB)
  • 002 Video and lab - Installing CSI Linux.mp4 (106.1 MB)
  • 003 Video and Lab - Creating a Kali Live (Forensic Mode) VM Using VirtualBox.en.srt (7.0 KB)
  • 003 Video and Lab - Creating a Kali Live (Forensic Mode) VM Using VirtualBox.mp4 (32.0 MB)
  • 004 Video and lab - Create a Virtual Install Kali Image Using VirtualBox.en.srt (9.8 KB)
  • 004 Video and lab - Create a Virtual Install Kali Image Using VirtualBox.mp4 (78.1 MB)
  • 005 Video and Lab - Create Virtual Install of Windows 10 Using VirtualBox.en.srt (22.7 KB)
  • 005 Video and Lab - Create Virtual Install of Windows 10 Using VirtualBox.mp4 (135.4 MB)
  • 006 Video and Lab - Install Additional Forensic Tools Using Katoolin3.en.srt (12.8 KB)
  • 006 Video and Lab - Install Additional Forensic Tools Using Katoolin3.mp4 (66.8 MB)
  • external-assets-links.txt (0.9 KB)
03 Using Kali Forensic Mode and Autopsy
  • 007 Video and Lab - Simulate Creating a Disk Image for a Forensic Analysis.en.srt (13.2 KB)
  • 007 Video and Lab - Simulate Creating a Disk Image for a Forensic Analysis.mp4 (65.0 MB)
  • 008 Video and Lab - Examining a forensic Disk Image Using Autopsy.en.srt (16.0 KB)
  • 008 Video and Lab - Examining a forensic Disk Image Using Autopsy.mp4 (109.0 MB)
  • external-assets-links.txt (0.5 KB)
04 Digital Forensics Case Management
  • 009 Video and Lab -Digital Forensics Using Autopsy Part I.en.srt (14.8 KB)
  • 009 Video and Lab -Digital Forensics Using Autopsy Part I.mp4 (116.6 MB)
  • 010 Video and Lab - Digital Forensics Using Autopsy Part II.en.srt (10.4 KB)
  • 010 Video and Lab - Digital Forensics Using Autopsy Part II.mp4 (73.4 MB)
  • 011 Video and Lab - Installing the WebMap-Nmap Dashboard.en.srt (15.7 KB)
  • 011 Video and Lab - Installing the WebMap-Nmap Dashboard.mp4 (66.6 MB)
  • external-assets-links.txt (0.4 KB)
05 Open-source intelligence (OSINT)
  • 012 Video and Lab - Conducting OSINT Using CSI Linux Investigator.en.srt (11.3 KB)
  • 012 Video and Lab - Conducting OSINT Using CSI Linux Investigator.mp4 (82.1 MB)
  • 013 Video and Lab - Find Social Media Accounts Using Sherlock.en.srt (9.3 KB)
  • 013 Video and Lab - Find Social Media Accounts Using Sherlock.mp4 (58.4 MB)
  • external-assets-links.txt (0.3 KB)
06 Computer Forensics
  • 014 Video - Attaching an External USB Divice in Kali.en.srt (9.4 KB)
  • 014 Video - Attaching an External USB Divice in Kali.mp4 (89.4 MB)
  • 015 Video and lab - Memory Forensics Using the Volatility Framework.en.srt (25.4 KB)
  • 015 Video and lab - Memory Forensics Using the Volatility Framework.mp4 (140.0 MB)
  • external-assets-links.txt (0.2 KB)
07 Using Shodan to Search for Vulnerable devices
  • 016 Video and Lab - Preparing CSI Investigator to Use Shodan.en.srt (8.5 KB)
  • 016 Video and Lab - Preparing CSI Investigator to Use Shodan.mp4 (43.4 MB)
  • 017 Video and Lab - Using Shodan to Find Vulnerable Devices.en.srt (19.9 KB)
  • 017 Video and Lab - Using Shodan to Find Vulnerable Devices.mp4 (146.3 MB)
  • 018 Video and lab - Using Shodan to Search for Vulnerable Databases.en.srt (10.4 KB)
  • 018 Video and lab - Using Shodan to Search for Vulnerable Databases.mp4 (82.5 MB)
  • external-assets-links.txt (0.4 KB)
08 Stenography
  • 019 Video and Lab - Using Steghide for Hiding and Extracting Data.en.srt (14.0 KB)
  • 019 Video and Lab - Using Steghide for Hiding and Extracting Data.mp4 (98.5 MB)
  • 020 Video and Lab - Using the EXIFtool to Read and Write EXIF Tags.en.srt (14.0 KB)
  • 020 Video and Lab - Using the EXIFtool to Read and Write EXIF Tags.mp4 (85.3 MB)
  • external-assets-links.txt (0.4 KB)
09 Network forensics Using Wireshark
  • 021 Video - Overview of Wireshark 3.2.en.srt (15.4 KB)
  • 021 Video - Overview of Wireshark 3.2.mp4 (116.8 MB)
  • 022 Video - Wireshark Capture Options.en.srt (10.0 KB)
  • 022 Video - Wireshark Capture Options.mp4 (42.2 MB)
  • 023 Wireshark Toolbar Icons.en.srt (5.2 KB)
  • 023 Wireshark Toolbar Icons.mp4 (36.2 MB)
  • 024 Video and Lab - Capturing a 3-way TCP Handshake Using Wireshark.en.srt (6.3 KB)
  • 024 Video and Lab - Capturing a 3-way TCP Handshake Using Wireshark.mp4 (44.5 MB)
  • 025 Video and Lab - Installing a Wireless Adapter in Kali.en.srt (12.2 KB)
  • 025 Video and Lab - Installing a Wireless Adapter in Kali.mp4 (52.6 MB)
  • 026 Video and Lab - Hacking a Wireless Network Using Kali Linux.en.srt (19.2 KB)
  • 026 Video and Lab - Hacking a Wireless Network Using Kali Linux.mp4 (96.8 MB)
  • 027 Video - Capturing Wireless Traffic Using Wireshark.en.srt (7.1 KB)
  • 027 Video - Capturing Wireless Traffic Using Wireshark.mp4 (40.8 MB)
  • external-assets-links.txt (0.5 KB)
  • TutsNode.com.txt (0.1 KB)
  • [TGx]Downloaded from torrentgalaxy.to .txt (0.6 KB)

Description


Description

Digital forensics is becoming very important in Cyber Security to detect and backtrack Black Hat Criminals. It is essential to remove Hackers’ malicious backdoors/malware and trace them back to avoid any possible future incidents. Digital forensics is becoming very important in Cyber Security to detect and backtrack Black Hat Criminals. Digital forensics is essential to remove Hackers’ malicious backdoors/malware and trace them back to avoid any possible future incidents.

This course acts as a digital forensics primer for pentesters and cybersecurity professionals wanting to expand their knowledge and add additional tools and skills to their resume.

Please watch the course overview before enrolling. Hands-on, applied learning is not for everyone. If you are looking for a PowerPoint driven course where students watch videos, download PDf files, and take notes, this course is not for you. There are plenty of lecture drive courses on Udemy but this is not one of them.

Make sure you understand the difference between watching and applying.
Who this course is for:

Pentesters interested digital forensic investigations.

Requirements

Good working knowledge of a computer.
Basic familiarity with Linux and Windows.
Good working knowledge of networking.

Last Updated 11/2020



Download torrent
2.6 GB
seeders:20
leechers:19
Udemy - Digital Forensics for Pentesters - Hands-on Learning


Trackers

tracker name
udp://inferno.demonoid.pw:3391/announce
udp://tracker.openbittorrent.com:80/announce
udp://tracker.opentrackr.org:1337/announce
udp://torrent.gresille.org:80/announce
udp://glotorrents.pw:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.pirateparty.gr:6969/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://9.rarbg.to:2710/announce
udp://shadowshq.yi.org:6969/announce
udp://tracker.zer0day.to:1337/announce
µTorrent compatible trackers list

Download torrent
2.6 GB
seeders:20
leechers:19
Udemy - Digital Forensics for Pentesters - Hands-on Learning


Torrent hash: 330B68ADC97C225FAECD7FC1F9561CA1FF4285EC