Lynda - Computer Security: Investigation and Response
- Type:
- Other > Other
- Files:
- 48
- Size:
- 273.73 MiB (287023582 Bytes)
- Uploaded:
- 2015-12-28 07:58:40 GMT
- By:
- 2boweb
- Seeders:
- 0
- Leechers:
- 1
- Comments
- 0
- Info Hash: E7E101DB2819B9AC8199E084821EF1C57D98B90D
(Problems with magnets links are fixed by upgrading your torrent client!)
Lynda - Computer Security: Investigation and Response This Course will be good to the Best for DL within 30 days after has been post, after that it might not be good DL already, please do me favour to continue seeding to keep this torrent alive. 1h 57m Advanced Dec 16, 2015 | Uploaded in Dec 26, 2015 2boweb Subject: IT Author: Sandra Toner Cybersecurity is a growing area of IT. Qualified computer forensics techs are in demand. But even if you aren't a forensics specialist, it can be useful to know how to collect evidence of harassment, hacking, and identity theft on your own computer or mobile phone. This course covers the basics of computer forensics and cyber crime investigation. Author Sandra Toner provides an overview of forensic science, and discusses best practices in the field and the frameworks professionals use to conduct investigations. Then, after showing how to set up a simple lab, Sandra describes how to respond to a cyber incident without disturbing the crime scene. She dives deep into evidence collection and recovery, explaining the differences between collecting evidence from Windows, Mac, and Linux machines. The course wraps up with a look at some of the more commonly used computer forensics software tools. Topics include: • Applying science to digital investigations • Understanding forensic frameworks • Defining cyber crime: harassment, hacking, and identity theft • Setting up a forensic lab • Responding to cyber incidents • Collecting and recovering evidence • Examining networks for evidence • Applying forensics to Windows, Mac, and Linux • Working with forensics tools //////////////////////////////////////////////////////////////////////////
027 Finding hidden data.mp4 | 12.03 MiB |
013 Differentiating nonaccess crimes.mp4 | 10.63 MiB |
023 Reporting cyber incidents.mp4 | 9.85 MiB |
045 Recovering a deleted file in Linux.mp4 | 9.58 MiB |
011 Examining cyber harassment.mp4 | 9.15 MiB |
043 Checking out Linux log files.mp4 | 8.97 MiB |
010 Defining identity theft.mp4 | 8.9 MiB |
005 Destroying digital evidence.mp4 | 8.33 MiB |
019 Discovering an incident.mp4 | 7.36 MiB |
035 Applying forensics to Windows.mp4 | 7.11 MiB |
028 Resurrecting data.mp4 | 7.05 MiB |
003 Applying science to digital investigations.mp4 | 6.94 MiB |
006 Using forensic best practices.mp4 | 6.84 MiB |
033 Detecting network intrusion.mp4 | 6.73 MiB |
004 Identifying digital evidence.mp4 | 6.49 MiB |
047 Checking out commercial forensic software.mp4 | 6.41 MiB |
039 Applying forensics to a Mac.mp4 | 6.22 MiB |
014 Building a knowledgebase.mp4 | 6.18 MiB |
025 Storing evidence.mp4 | 6.06 MiB |
029 Working with damaged media.mp4 | 5.99 MiB |
024 Following protocol.mp4 | 5.96 MiB |
018 Selecting forensic software.mp4 | 5.87 MiB |
046 Checking out open-source forensic tools.mp4 | 5.69 MiB |
012 Explaining hacking techniques.mp4 | 5.68 MiB |
044 Finding Linux directories.mp4 | 5.57 MiB |
017 Considering legal implications.mp4 | 5.36 MiB |
020 Differentiating between postmortem and live forensics.mp4 | 5.22 MiB |
038 Locating evidence from the Windows Registry.mp4 | 5.16 MiB |
021 Preserving evidence.mp4 | 5.04 MiB |
007 Examining forensic frameworks.mp4 | 5.02 MiB |
026 Imaging evidence.mp4 | 4.86 MiB |
036 Checking the Windows audit log.mp4 | 4.84 MiB |
030 Viewing browser history.mp4 | 4.58 MiB |
037 Finding Windows directories.mp4 | 4.53 MiB |
040 Checking out Mac logs.mp4 | 4.52 MiB |
031 Recovering evidence from a cellular phone.mp4 | 4.27 MiB |
009 Classifying cyber crime.mp4 | 4.27 MiB |
008 Ensuring scientific relevance.mp4 | 3.99 MiB |
034 Examining router evidence.mp4 | 3.93 MiB |
001 Welcome.mp4 | 3.73 MiB |
041 Finding Mac directories.mp4 | 3.55 MiB |
022 Applying forensics to disaster recovery.mp4 | 3.29 MiB |
015 Working with evidence.mp4 | 3.18 MiB |
016 Equipping the lab.mp4 | 3.01 MiB |
032 Checking out firewall logs.mp4 | 2.86 MiB |
048 Next steps and resources.mp4 | 1.56 MiB |
042 Applying forensics to Linux.mp4 | 835.08 KiB |
002 What you should know before watching this course.mp4 | 592.68 KiB |