YoVDO

Predator to Prey - Tracking Criminals with Trojans and Data Mining for Fun and Profit

Offered By: YouTube

Tags

Conference Talks Courses Data Mining Courses Cybersecurity Courses Ethical Hacking Courses Digital Forensics Courses Malware Detection Courses USB Security Courses

Course Description

Overview

Explore the world of digital forensics and cybercrime investigation in this 43-minute conference talk from GrrCon 2016. Delve into various tracking techniques, from USB hacks and theft recovery to mobile security and data mining. Learn about the Cards Exchange Principle, ethical implications of digital surveillance, and real-world case studies involving stolen cameras and laptops. Discover how to leverage tools like Apple Script, Flickr API, and Exif data for investigative purposes. Gain insights into the creation of "crazy walls" for visualizing complex cases and understand the evolving landscape of predator-to-prey tracking in the digital age.

Syllabus

Introduction
The Cards Exchange Principle
Boogie Data
Ethical Implications
USB Hacks
Theft Recovery
Windows USB Client
iPod Recovery
Apple Script
USB Malware
Crazy Walls
Laptop Tracking
Flickr API
Recovering an iMac
Tracking laptops
Victor
Mobile Security
Surveillance Photos
Exif Data
Data Mining
Stolen Camera Case
Camera Case


Related Courses

Introduction to Data Science
University of Washington via Coursera
Big Data Analytics in Healthcare
Georgia Institute of Technology via Udacity
More Data Mining with Weka
University of Waikato via Independent
Mining Massive Datasets
Stanford University via edX
Pattern Discovery in Data Mining
University of Illinois at Urbana-Champaign via Coursera