This course will familiarize students with all aspects of Windows forensics.By the end of this course students will be able to perform live analysis, capture volatile data, make images of media, analyze filesystems, analyze network traffic, analyze files, perform memory analysis, and analyze malware for a Windows subject on a Linux system with readily available free and open source tools. Students will also gain an in-depth understanding of how Windows works under the covers.
The Linux operating system is more relevant than ever for a wide range of everyday tasks. With the proper commands, you can perform remote system administration, back up data, lock down security, access network resources, and so much more. This Learning Path covers everything you need to be a competent Linux system administrator.
The phrase ‘the best offense is a good defense’ couldn’t be more applicable to the realm of enterprise penetration testing and security. This Learning Path specifically focuses on the broader Kali Linux toolkit, and will provide you with the expertise and exposure you need to fully test and explore your local networks with confidence. Please test responsibly.
Learn how to test security mechanisms and how to conduct penetration tests on working machines or databases.
Kali Linux is a powerful Linux based operating system specifically built for penetration testing. Viewers will hear a brief overview of the operating system and what kinds of things it can be useful for.
This course teaches students how to analyse logs effectively using tools already available to you. The students will be taught how to analyse logs using Python, Powershell and Bash. Using real world examples, you will see how suspicious activity can be inferred from the logs by looking at various parameters.