Project Ares Academy Plus + Computer Hacking Forensic Investigator Bundle
Rated 3.5/5 based on 11 customer reviews

Project Ares Academy Plus + Computer Hacking Forensic Investigator Bundle

Available: In Stock
$348.00

Image

Project Ares Academy Plus

Virtual Courses & Labs

  • Computer Forensics in Today’s World
  • Computer Forensics Investigation Process
    • Creating a Case in Autopsy
    • Creating a Case in FTK
    • Creating a Case in OSF
  • Understanding Hard Disks and File Systems
    • Hash Verification
    • Intro To Linux - File Systems
  • Operating System Forensics
    • Event Logs
    • Registry Analysis
    • Creating a Baseline Using the Windows Forensic Toolchest (WFT)
    • Windows Event Log Manipulation via Windows Event Viewer
    • Linux Analysis
    • Securing Linux - Host Based IDS
    • Securing Linux - Log Monitoring and Auditd
    • MAC Analysis
  • Defeating Anti-Forensics Techniques
    • Open Source Password Cracking
    • Password Cracking with PRTK
  • Data Acquisition and Duplication
    • Metadata Extraction Lab
    • Data Recovery with Autopsy
    • Memory Extraction and Analysis
  • Network Forensics
    • Network Miner
    • Monitoring Network Traffic
    • Searching for Indicators of Compromise
    • Use pfTop to Analyze Network Traffic
    • Automated in-Depth Packet Decoding
    • Parse Files Out of Network Traffic
    • Securing Linux - Network Intrusion Detection
  • Investigating Web Attacks
    • Internet History
    • WebApp Attack PCAP Analysis
    • Recover from Web-Based
    • Flashpack Incident
  • Database Forensics
  • Cloud Forensics
  • Malware Forensics
    • Analyze Malicious Activity in Memory Using Volatility
    • Conduct Log Analysis and Cross Examination for False Positives
    • Detect the Introduction of a Malicious Application
    • Identify and Remove Trojan Using Various Tools
    • Identify Suspicious Information in VM Snapshots
  • Investigating E-mail Crimes
  • Mobile Forensics
  • Investigative Reports
  • Capstone Labs:
    • Practical - Photos R Us
    • Image Forensics Capstone
    • Dynamic Malware Analysis Capstone
    • Incident Detection and Identification

Project Ares Academy Plus

Virtual Courses & Labs

  • Computer Forensics in Today’s World
  • Computer Forensics Investigation Process
    • Creating a Case in Autopsy
    • Creating a Case in FTK
    • Creating a Case in OSF
  • Understanding Hard Disks and File Systems
    • Hash Verification
    • Intro To Linux - File Systems
  • Operating System Forensics
    • Event Logs
    • Registry Analysis
    • Creating a Baseline Using the Windows Forensic Toolchest (WFT)
    • Windows Event Log Manipulation via Windows Event Viewer
    • Linux Analysis
    • Securing Linux - Host Based IDS
    • Securing Linux - Log Monitoring and Auditd
    • MAC Analysis
  • Defeating Anti-Forensics Techniques
    • Open Source Password Cracking
    • Password Cracking with PRTK
  • Data Acquisition and Duplication
    • Metadata Extraction Lab
    • Data Recovery with Autopsy
    • Memory Extraction and Analysis
  • Network Forensics
    • Network Miner
    • Monitoring Network Traffic
    • Searching for Indicators of Compromise
    • Use pfTop to Analyze Network Traffic
    • Automated in-Depth Packet Decoding
    • Parse Files Out of Network Traffic
    • Securing Linux - Network Intrusion Detection
  • Investigating Web Attacks
    • Internet History
    • WebApp Attack PCAP Analysis
    • Recover from Web-Based
    • Flashpack Incident
  • Database Forensics
  • Cloud Forensics
  • Malware Forensics
    • Analyze Malicious Activity in Memory Using Volatility
    • Conduct Log Analysis and Cross Examination for False Positives
    • Detect the Introduction of a Malicious Application
    • Identify and Remove Trojan Using Various Tools
    • Identify Suspicious Information in VM Snapshots
  • Investigating E-mail Crimes
  • Mobile Forensics
  • Investigative Reports
  • Capstone Labs:
    • Practical - Photos R Us
    • Image Forensics Capstone
    • Dynamic Malware Analysis Capstone
    • Incident Detection and Identification