YoVDO

Pilfering Local Data - Attacker Strategies for Short-Term Local Access

Offered By: YouTube

Tags

Microsoft Access Courses Encryption Courses Password Hashing Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore techniques and tools used by attackers to extract valuable local data during short-term physical access to a device. Learn about boot environments, password hashes, cash information retrieval, and methods for accessing data on various operating systems including Windows XP. Discover encryption practices, useful resources, and gain insights into information security concepts as presented by Louisville InfoSec.

Syllabus

Intro
About Me
Boot Environment
Useful Tools
Reasons Why
Assumptions
Password Hashes
Cash Information
Outlook
Windows XP
SCRAM
Other Tools
Boot Media
More Resources
Louisville InfoSec
Encryption


Related Courses

Internet History, Technology, and Security
University of Michigan via Coursera
Sicherheit im Internet
openHPI
أساسيات التشفير
Rwaq (رواق)
Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera
Web Application Development: Security
University of New Mexico via Coursera