YoVDO

Pilfering Local Data - Attacker Strategies for Short-Term Local Access

Offered By: YouTube

Tags

Microsoft Access Courses Encryption Courses Password Hashing Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore techniques and tools used by attackers to extract valuable local data during short-term physical access to a device. Learn about boot environments, password hashes, cash information retrieval, and methods for accessing data on various operating systems including Windows XP. Discover encryption practices, useful resources, and gain insights into information security concepts as presented by Louisville InfoSec.

Syllabus

Intro
About Me
Boot Environment
Useful Tools
Reasons Why
Assumptions
Password Hashes
Cash Information
Outlook
Windows XP
SCRAM
Other Tools
Boot Media
More Resources
Louisville InfoSec
Encryption


Related Courses

Diseño de sistemas de información gerencial para intranet con Microsoft Access
Universidad del Rosario via edX
Competencias digitales de ofimática: Microsoft Access
Universitat Autònoma de Barcelona (Autonomous University of Barcelona) via Coursera
Diseño de software para la toma de decisiones organizacionales
Universidad del Rosario via edX
Excel to Access: Intro to Microsoft Access for Excel Users
Udemy
Access 2007: Shortcuts
LinkedIn Learning