Logging for Hackers - How You Can Catch Them With What You Already Have and a Walk Through of an

Logging for Hackers - How You Can Catch Them With What You Already Have and a Walk Through of an

via YouTube Direct link

Crypto

26 of 31

26 of 31

Crypto

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Logging for Hackers - How You Can Catch Them With What You Already Have and a Walk Through of an

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Why listen to me
  3. 3 Evolve or die
  4. 4 Statistics
  5. 5 Chasing Hashes
  6. 6 Win NT
  7. 7 Persistence
  8. 8 Program Files
  9. 9 C tar
  10. 10 Droidx artifacts
  11. 11 Dried X persistence
  12. 12 Dried X is back
  13. 13 PowerShell
  14. 14 Cheat Sheet
  15. 15 Command Line Logging
  16. 16 Example Query
  17. 17 Practice Malware Management
  18. 18 What do we look for
  19. 19 What do we take away
  20. 20 LoginD
  21. 21 Audit Report
  22. 22 Purpose
  23. 23 Free Audit
  24. 24 Pro
  25. 25 Future
  26. 26 Crypto
  27. 27 Word Doc
  28. 28 Windows Firewall
  29. 29 What do you get
  30. 30 Resources
  31. 31 Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.