Nome: | Packt | Python Digital Forensics [FCO] GloDLS |
Description: By: Daryl Bennett Released: Friday, September 28, 2018 Torrent Contains: 30 Files, 6 Folders Course Source: https://www.packtpub.com/web-development/python-digital-forensics-video Use common Python libraries and tools to excel in network and host digital forensics Video Details ISBN 9781787126664 Course Length 22 hours 55 minutes Table of Contents • PYTHON FOR NETWORK FORENSICS • WINDOWS • GNU/LINUX FORENSICS • MEMORY FORENSICS • THREAT EMULATION Video Description Python is uniquely positioned as a programming language to perform cyber investigations and perform forensics analysis. Unleash the power of Python by using popular libraries and Python tools to help you create efficient and thorough forensics investigations. This course will walk you through digital forensics on network traffic, host analysis, and memory analysis. The course starts with network forensics, an important aspect of any investigation. You will learn to read, sort, and sniff raw packets and also analyze network traffic. These techniques will help you drive your host analysis. You will learn about tools you'll need to perform a complete investigation with the utmost efficiency in both Windows and GNU/Linux environments with Python. Next, you will learn more advanced topics such as viewing data in PE and ELF binaries. It's vital to analyze volatile memory during an investigation as it provides details about what is actually running on a given system. So, you will learn the best tools to obtain and analyze volatile memory images. Finally, you will learn how to use Python in order to think like an attacker. You will complete enumeration, exploitation, and data exfiltration. By the end of the course, you will be able to make the most of Python processes and tackle varied, challenging, forensics-related problems. So, grab this course and think like an attacker! The code bundle for this course is available at https://github.com/PacktPublishing/Recipes-to-Successful-Python-Digital-Forensics. Style and Approach This course adopts a recipe-based approach with progressive complexity. You will learn about network forensics and techniques to drive your host analysis. Next, you will master different tools you'll need to complete investigations in both Windows and GNU/ Linux environments with Python. Then you'll learn more advanced topics, including the benefits of volatile memory acquisition and analysis. By the end of the course, you will have learned the basics of how to think as an attacker. What You Will Learn • Think like an attacker and solve forensics issues with more efficiently • Learn network forensics to drive your host analysis • Investigate with the utmost efficiency in Windows and GNU/Linux environments • Learn advanced data-viewing topics in file analysis • Get the best tools to obtain and analyze volatile memory images • Use Python to complete enumeration, exploitation, and data exfiltration Authors Daryl Bennett Daryl Bennett is a manager of a Cyberspace Threat Emulation team with the United States Air Force, where he leads military and civilian members in the employment and execution of offensive security on order to audit the security of network infrastructures. He is a key operator, focusing on risk analysis and the overall security posture of cyberspace systems. Additionally, he has 5+ years' experience working in the open-source community. He is a development specialist in a wide range of domains, including GNU/Linux applications, Android mobile, and autonomous systems. He is passionate about sustaining, developing, and implementing both current and new technologies, while practicing analytical problem-solving and learning as much as possible in the process. | |
Video YouTube: | |
Categoria: | Tutorials |
Idioma: | English |
Total Size: | 751.58 MB |
Informações Hash: | 26E8D9BACEE51BEADFD0C13084CE0A04563B211F |
Adicionado por: | Prom3th3uS |
Data adicionada: | 2019-04-30 17:27:11 |
Torrent Status: | Torrent Verified |
Ratings: | Not Yet Rated (Log in to rate it) |
URL | Semeadores | Leechers | Concluído |
---|---|---|---|
https://t.quic.ws:443/announce | 0 | 0 | 0 |
udp://tracker.torrent.eu.org:451/announce | 0 | 0 | 0 |
udp://tracker.cyberia.is:6969/announce | 0 | 0 | 0 |
udp://tracker.leechers-paradise.org:6969/announce | 0 | 0 | 0 |
udp://open.stealth.si:80/announce | 1 | 1 | 0 |
udp://exodus.desync.com:6969/announce | 0 | 1 | 0 |
udp://explodie.org:6969/announce | 1 | 1 | 0 |
udp://denis.stalker.upeer.me:6969/announce | 0 | 0 | 0 |
udp://tracker.opentrackr.org:1337/announce | 2 | 1 | 0 |
udp://9.rarbg.to:2710/announce | 0 | 0 | 0 |
udp://tracker.tiny-vps.com:6969/announce | 0 | 1 | 0 |
udp://ipv4.tracker.harry.lu:80/announce | 0 | 0 | 0 |
udp://tracker.coppersurfer.tk:6969/announce | 0 | 0 | 0 |
udp://tracker.internetwarriors.net:1337/announce | 0 | 0 | 0 |
udp://open.demonii.si:1337/announce | 0 | 0 | 0 |