Project Ares Enterprise + Computer Hacking Forensic Investigator Bundle
Project Ares Enterprise + Computer Hacking Forensic Investigator Bundle
Available:
In Stock
$898.00
Project Ares Enterprise Bundle
Virtual Courses & Labs
- Computer Forensics in Today’s World
- Computer Forensics Investigation Process
- Creating a Case in Autopsy
- Creating a Case in FTK
- Creating a Case in OSF
- Understanding Hard Disks and File Systems
- Hash Verification
- Intro To Linux - File Systems
- Operating System Forensics
- Event Logs
- Registry Analysis
- Creating a Baseline Using the Windows Forensic Toolchest (WFT)
- Windows Event Log Manipulation via Windows Event Viewer
- Linux Analysis
- Securing Linux - Host Based IDS
- Securing Linux - Log Monitoring and Auditd
- MAC Analysis
- Defeating Anti-Forensics Techniques
- Open Source Password Cracking
- Password Cracking with PRTK
- Data Acquisition and Duplication
- Metadata Extraction Lab
- Data Recovery with Autopsy
- Memory Extraction and Analysis
- Network Forensics
- Network Miner
- Monitoring Network Traffic
- Searching for Indicators of Compromise
- Use pfTop to Analyze Network Traffic
- Automated in-Depth Packet Decoding
- Parse Files Out of Network Traffic
- Securing Linux - Network Intrusion Detection
- Investigating Web Attacks
- Internet History
- WebApp Attack PCAP Analysis
- Recover from Web-Based
- Flashpack Incident
- Database Forensics
- Cloud Forensics
- Malware Forensics
- Analyze Malicious Activity in Memory Using Volatility
- Conduct Log Analysis and Cross Examination for False Positives
- Detect the Introduction of a Malicious Application
- Identify and Remove Trojan Using Various Tools
- Identify Suspicious Information in VM Snapshots
- Investigating E-mail Crimes
- Mobile Forensics
- Investigative Reports
- Capstone Labs:
- Practical - Photos R Us
- Image Forensics Capstone
- Dynamic Malware Analysis Capstone
- Incident Detection and Identification
Project Ares Enterprise Bundle
Virtual Courses & Labs
- Computer Forensics in Today’s World
- Computer Forensics Investigation Process
- Creating a Case in Autopsy
- Creating a Case in FTK
- Creating a Case in OSF
- Understanding Hard Disks and File Systems
- Hash Verification
- Intro To Linux - File Systems
- Operating System Forensics
- Event Logs
- Registry Analysis
- Creating a Baseline Using the Windows Forensic Toolchest (WFT)
- Windows Event Log Manipulation via Windows Event Viewer
- Linux Analysis
- Securing Linux - Host Based IDS
- Securing Linux - Log Monitoring and Auditd
- MAC Analysis
- Defeating Anti-Forensics Techniques
- Open Source Password Cracking
- Password Cracking with PRTK
- Data Acquisition and Duplication
- Metadata Extraction Lab
- Data Recovery with Autopsy
- Memory Extraction and Analysis
- Network Forensics
- Network Miner
- Monitoring Network Traffic
- Searching for Indicators of Compromise
- Use pfTop to Analyze Network Traffic
- Automated in-Depth Packet Decoding
- Parse Files Out of Network Traffic
- Securing Linux - Network Intrusion Detection
- Investigating Web Attacks
- Internet History
- WebApp Attack PCAP Analysis
- Recover from Web-Based
- Flashpack Incident
- Database Forensics
- Cloud Forensics
- Malware Forensics
- Analyze Malicious Activity in Memory Using Volatility
- Conduct Log Analysis and Cross Examination for False Positives
- Detect the Introduction of a Malicious Application
- Identify and Remove Trojan Using Various Tools
- Identify Suspicious Information in VM Snapshots
- Investigating E-mail Crimes
- Mobile Forensics
- Investigative Reports
- Capstone Labs:
- Practical - Photos R Us
- Image Forensics Capstone
- Dynamic Malware Analysis Capstone
- Incident Detection and Identification