AccessData Password Recovery Toolkit (PRTK)
Offered By: Pluralsight
Course Description
Overview
Learn how to use AccessData’s Password Recovery Toolkit, which is a part of their Forensic Toolkit, to recover passwords. This will allow you to decrypt all sorts of encrypted documents and containers, like MS Word, PDF, TrueCrypt, and many more.
If you need to gain access to password protected files, then PRTK is the tool for you. In this course, AccessData Password Recovery Toolkit (PRTK), you’ll learn to recover passwords so you can decrypt a variety of different file types. First, you’ll explore the Password Recovery Toolkit interface, so you’ll be comfortable with using the product. Next, you’ll discover how to create custom dictionaries and profiles to help find passwords in different situations. Finally, you’ll learn how to recover passwords from encrypted files and containers. When you’re finished with this course, you’ll have the skills and knowledge of a password recovery expert needed to discover and decrypt a wide variety of encrypted file types.
If you need to gain access to password protected files, then PRTK is the tool for you. In this course, AccessData Password Recovery Toolkit (PRTK), you’ll learn to recover passwords so you can decrypt a variety of different file types. First, you’ll explore the Password Recovery Toolkit interface, so you’ll be comfortable with using the product. Next, you’ll discover how to create custom dictionaries and profiles to help find passwords in different situations. Finally, you’ll learn how to recover passwords from encrypted files and containers. When you’re finished with this course, you’ll have the skills and knowledge of a password recovery expert needed to discover and decrypt a wide variety of encrypted file types.
Syllabus
- Course Overview 1min
- Understanding and Initializing Password Recovery Toolkit for First Use 21mins
- Identify Encrypted Files with FTK 26mins
- Use the Dictionary Tool in PRTK 25mins
- Use Rules and Profiles to Optimize Your Password Recovery Attacks 17mins
- Decrypting Files and Containers with PRTK 26mins
Taught by
Larry Glusman
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent