Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Defining Cyberwar

 

Rating :

 

Comments

 
  • CCotton10
    CCotton10 at April 22,2016
    It seems like some of these videos should be used as training tools for some of the Cyber Training courses. It is amazing how simple it was to gain control of someone's email. Security is a real concern.
  • jnegron
    jnegron at April 26,2016
    Excellent presentation about the tools and methods.. Mandiant keep leading the way in forensics and pentest.
  • ronnypaladino
    ronnypaladino at June 10,2016
    Very interesting video. How does the Chinese deny being involved in Cyber activity? Oh, I see, the government is not involved :). This clearly shows the need of implementing strong security policies and have good forensic investigators conducting analysis on discovered penetrated networks to learn the methods used and possibly provide attribution. Mandiant took a step further and went after them, clearly attributing the attacks to the Chinese.
  • jpnick99
    jpnick99 at June 12,2016
    It's amazing how relatively simple this process was. It was more about patience and multiple targets than anything else. It's just a matter of time and talent to put it all together to pull off a hack. The type of files he was using to ex filtrate and infiltrate (rar and zip) immediately throw up red flags when i'm examining a system.
  • cg09829
    cg09829 at June 19,2016
    Good example of how easy it is for the Chinese to steal your credentials and/or gain access to your system via spear phishing.
    • «
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15
    • 16
    • 17
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved