Call Us Today! 505.341.3228

jennifer.hernandez

/Jennifer Hernandez

About Jennifer Hernandez

This author has not yet filled in any details.
So far Jennifer Hernandez has created 43 blog entries.

Understanding Hard Disks and File Systems

While investigating a computer-based crime, it is most important to understand hard disks and filesystems, as these are the major sources of data storage. People usually delete their tracks after committing a crime with a computer in order to avoid being traced. That is why recovering the deleted files of hard disks and analyzing filesystems [...]

September 4th, 2014|Categories: Incident Handling Exercises|Comments Off on Understanding Hard Disks and File Systems

Computer Forensics Investigation Process

The computer forensics investigation process is a methodological approach of preparing for an investigation, collecting and analyzing digital evidence, and managing the case from the reporting of the crime until the case'™s conclusion. Recovering deleted file from hard disk Viewing disk raw sectors Using encrypting command Generating hashes and checksum [...]

September 4th, 2014|Categories: Computer Forensics Investigation Process, Incident Handling Exercises|Comments Off on Computer Forensics Investigation Process

Trojans and Backdoors

A Trojan is a program that contains malicious or harmful code inside apparently harmless programming or data in such a way that it can get control and cause damage, such as ruining the file allocation table on a hard disk. With the help of a Trojan, an attacker gets access to stored passwords in a [...]

September 4th, 2014|Categories: Incident Handling Exercises, Trojans and Backdoors|Comments Off on Trojans and Backdoors

Incident Handling Exercises

Incident Handling Exercises are available as part of the following subscription: Each subscription provides 6 months of access to over 75 Different Exercises. Each exercise contains a Scenario, Objectives, and individual step by step tasks to guide the user through all steps necessary to complete the exercise. Lab exercises are included for: Trojans and Backdoors [...]

September 3rd, 2014|Categories: Incident Handling Exercises|Comments Off on Incident Handling Exercises

Secure Programming Exercises

Secure Programming Exercises are available as part of the following subscription: Each subscription provides 6 months of access to 68 Different Exercises. Each exercise contains a Scenario, Objectives, and individual step by step tasks to guide the user through all steps necessary to complete the exercise. The Secure Programming Exercises are designed to give the user [...]

September 3rd, 2014|Categories: Secure Programming Exercises|Comments Off on Secure Programming Exercises

SQL Penetration Testing

SQL Injection is a technique often used to attack a website. It is the most common website vulnerability on the Internet. Understanding when and how a web application connects to a database server in order to access data Extracting basic SQL Injection flaws and vulnerabilities Testing web applications for Blind SQL [...]

August 25th, 2014|Categories: Security Analyst Exercises, SQL Penetration Testing|Comments Off on SQL Penetration Testing

Web Application Penetration Testing

Web Applications Penetration Testing refers to carrying unauthorized access of a website or the website details. Parameter tampering Cross-Site Scripting (XSS) Web Application Penetration Testing The Security Analyst Exercises / Web Application Penetration Testing contains the following Exercises: Hacking Web Applications The Virtual [...]

August 25th, 2014|Categories: Security Analyst Exercises, Web Application Penetration Testing|Comments Off on Web Application Penetration Testing

Social Engineering Penetration Testing

Social engineering is the art of convincing people to reveal confidential information. Social engineers depend on the fact that people are aware of valuable information and are not usually diligent in protecting it. Protect the network from phishing attacks To do this lab, you need:A computer running Kali Linux operating System [...]

August 20th, 2014|Categories: Security Analyst Exercises, Social Engineering Penetration Testing|Comments Off on Social Engineering Penetration Testing

Password Cracking Penetration Testing

Password Cracking Penetration Testing The Security Analyst Exercises / Password Cracking Penetration Testing contains the following Exercises: Extracting Administrator Passwords Using L0phtCrack The Virtual Private Cloud for this Lab set utilizes: Security Analyst Exercises are available as part of the following subscription: Each subscription provides 6 months access to 15 Different Exercises. [...]

August 20th, 2014|Categories: Password Cracking Penetration Testing, Security Analyst Exercises|Comments Off on Password Cracking Penetration Testing

IDS Penetration Testing

An intrusion detection system (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station. Install and configure Snort IDS Run Snort as a service Machine names, network resources, and services Store snort log files to [...]

August 20th, 2014|Categories: IDS Penetration Testing, Security Analyst Exercises|Comments Off on IDS Penetration Testing