YoVDO

Pilfering Local Data - Attacker Strategies for Short-Term Local Access

Offered By: YouTube

Tags

Microsoft Access Courses Encryption Courses Password Hashing Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore techniques and tools used by attackers to extract valuable local data during short-term physical access to a device. Learn about boot environments, password hashes, cash information retrieval, and methods for accessing data on various operating systems including Windows XP. Discover encryption practices, useful resources, and gain insights into information security concepts as presented by Louisville InfoSec.

Syllabus

Intro
About Me
Boot Environment
Useful Tools
Reasons Why
Assumptions
Password Hashes
Cash Information
Outlook
Windows XP
SCRAM
Other Tools
Boot Media
More Resources
Louisville InfoSec
Encryption


Related Courses

Build a SMS Verification with Login System Using PHP MySQL
Udemy
Secured Login Registration System in PHP - Email Activation
Udemy
Complete Login/Registration System in PHP & MYSQL 2021
Udemy
PHP Login and Registration System - Email Confirm Activation
Udemy
Introduction to User Authentication in PHP Course (How To)
Treehouse