Details for this torrent 

Lynda - Computer Security: Investigation and Response
Type:
Other > Other
Files:
48
Size:
273.73 MiB (287023582 Bytes)
Uploaded:
2015-12-28 07:58:40 GMT
By:
2boweb VIP
Seeders:
0
Leechers:
1
Comments
0  

Info Hash:
E7E101DB2819B9AC8199E084821EF1C57D98B90D




(Problems with magnets links are fixed by upgrading your torrent client!)
Lynda - Computer Security: Investigation and Response

This Course will be good to the Best for DL within 30 days after has been post, after that it might not be good DL already, please do me favour to continue seeding to keep this torrent alive.

1h 57m Advanced Dec 16, 2015  | Uploaded in Dec 26, 2015 2boweb

Subject: IT 
Author: Sandra Toner 
 
Cybersecurity is a growing area of IT. Qualified computer forensics techs are in demand. But even if you aren't a forensics specialist, it can be useful to know how to collect evidence of harassment, hacking, and identity theft on your own computer or mobile phone.

This course covers the basics of computer forensics and cyber crime investigation. Author Sandra Toner provides an overview of forensic science, and discusses best practices in the field and the frameworks professionals use to conduct investigations. Then, after showing how to set up a simple lab, Sandra describes how to respond to a cyber incident without disturbing the crime scene. She dives deep into evidence collection and recovery, explaining the differences between collecting evidence from Windows, Mac, and Linux machines. The course wraps up with a look at some of the more commonly used computer forensics software tools.
Topics include:
	•	Applying science to digital investigations
	•	Understanding forensic frameworks
	•	Defining cyber crime: harassment, hacking, and identity theft
	•	Setting up a forensic lab
	•	Responding to cyber incidents
	•	Collecting and recovering evidence
	•	Examining networks for evidence
	•	Applying forensics to Windows, Mac, and Linux
	•	Working with forensics tools


//////////////////////////////////////////////////////////////////////////

027 Finding hidden data.mp412.03 MiB
013 Differentiating nonaccess crimes.mp410.63 MiB
023 Reporting cyber incidents.mp49.85 MiB
045 Recovering a deleted file in Linux.mp49.58 MiB
011 Examining cyber harassment.mp49.15 MiB
043 Checking out Linux log files.mp48.97 MiB
010 Defining identity theft.mp48.9 MiB
005 Destroying digital evidence.mp48.33 MiB
019 Discovering an incident.mp47.36 MiB
035 Applying forensics to Windows.mp47.11 MiB
028 Resurrecting data.mp47.05 MiB
003 Applying science to digital investigations.mp46.94 MiB
006 Using forensic best practices.mp46.84 MiB
033 Detecting network intrusion.mp46.73 MiB
004 Identifying digital evidence.mp46.49 MiB
047 Checking out commercial forensic software.mp46.41 MiB
039 Applying forensics to a Mac.mp46.22 MiB
014 Building a knowledgebase.mp46.18 MiB
025 Storing evidence.mp46.06 MiB
029 Working with damaged media.mp45.99 MiB
024 Following protocol.mp45.96 MiB
018 Selecting forensic software.mp45.87 MiB
046 Checking out open-source forensic tools.mp45.69 MiB
012 Explaining hacking techniques.mp45.68 MiB
044 Finding Linux directories.mp45.57 MiB
017 Considering legal implications.mp45.36 MiB
020 Differentiating between postmortem and live forensics.mp45.22 MiB
038 Locating evidence from the Windows Registry.mp45.16 MiB
021 Preserving evidence.mp45.04 MiB
007 Examining forensic frameworks.mp45.02 MiB
026 Imaging evidence.mp44.86 MiB
036 Checking the Windows audit log.mp44.84 MiB
030 Viewing browser history.mp44.58 MiB
037 Finding Windows directories.mp44.53 MiB
040 Checking out Mac logs.mp44.52 MiB
031 Recovering evidence from a cellular phone.mp44.27 MiB
009 Classifying cyber crime.mp44.27 MiB
008 Ensuring scientific relevance.mp43.99 MiB
034 Examining router evidence.mp43.93 MiB
001 Welcome.mp43.73 MiB
041 Finding Mac directories.mp43.55 MiB
022 Applying forensics to disaster recovery.mp43.29 MiB
015 Working with evidence.mp43.18 MiB
016 Equipping the lab.mp43.01 MiB
032 Checking out firewall logs.mp42.86 MiB
048 Next steps and resources.mp41.56 MiB
042 Applying forensics to Linux.mp4835.08 KiB
002 What you should know before watching this course.mp4592.68 KiB