Details for this torrent 

Learning Lynda - Computer Security Investigation and Response
Type:
Other > Other
Files:
49
Size:
272.09 MiB (285307315 Bytes)
Uploaded:
2017-07-16 22:17:18 GMT
By:
sumi VIP
Seeders:
0
Leechers:
0
Comments
0  

Info Hash:
E7E60AC5FF3E914512DEC0F77EF02431F27EC0C4




(Problems with magnets links are fixed by upgrading your torrent client!)
Cybersecurity is a growing area of IT. Qualified computer forensics techs are in demand. But even if you aren't a forensics specialist, it can be useful to know how to collect evidence of harassment, hacking, and identity theft on your own computer or mobile phone.

This course covers the basics of computer forensics and cyber crime investigation. Author Sandra Toner provides an overview of forensic science, and discusses best practices in the field and the frameworks professionals use to conduct investigations. Then, after showing how to set up a simple lab, Sandra describes how to respond to a cyber incident without disturbing the crime scene. She dives deep into evidence collection and recovery, explaining the differences between collecting evidence from Windows, Mac, and Linux machines. The course wraps up with a look at some of the more commonly used computer forensics software tools.
Topics include:
Applying science to digital investigations
Understanding forensic frameworks
Defining cyber crime: harassment, hacking, and identity theft
Setting up a forensic lab
Responding to cyber incidents
Collecting and recovering evidence
Examining networks for evidence
Applying forensics to Windows, Mac, and Linux
Working with forensics tools

00. Introduction/00_01 - Welcome.mp42.76 MiB
00. Introduction/00_02 - What you should know before watching this course.mp4571.72 KiB
01. Understanding Forensic Science/01_01 - Applying science to digital investigations.mp46.9 MiB
01. Understanding Forensic Science/01_02 - Identifying digital evidence.mp46.58 MiB
01. Understanding Forensic Science/01_03 - Destroying digital evidence.mp48.3 MiB
01. Understanding Forensic Science/01_04 - Using forensic best practices.mp46.78 MiB
01. Understanding Forensic Science/01_05 - Examining forensic frameworks.mp44.99 MiB
01. Understanding Forensic Science/01_06 - Ensuring scientific relevance.mp43.99 MiB
02. Defining Cyber Crime/02_01 - Classifying cyber crime.mp44.24 MiB
02. Defining Cyber Crime/02_02 - Defining identity theft.mp48.91 MiB
02. Defining Cyber Crime/02_03 - Examining cyber harassment.mp49.12 MiB
02. Defining Cyber Crime/02_04 - Explaining hacking techniques.mp45.72 MiB
02. Defining Cyber Crime/02_05 - Differentiating nonaccess crimes.mp410.59 MiB
03. Setting Up a Forensic Lab/03_01 - Building a knowledgebase.mp46.13 MiB
03. Setting Up a Forensic Lab/03_02 - Working with evidence.mp43.16 MiB
03. Setting Up a Forensic Lab/03_03 - Equipping the lab.mp42.99 MiB
03. Setting Up a Forensic Lab/03_04 - Considering legal implications.mp45.31 MiB
03. Setting Up a Forensic Lab/03_05 - Selecting forensic software.mp45.85 MiB
04. Responding to a Cyber Incident/04_01 - Discovering an incident.mp47.39 MiB
04. Responding to a Cyber Incident/04_02 - Differentiating between postmortem and live forensics.mp45.19 MiB
04. Responding to a Cyber Incident/04_03 - Preserving evidence.mp45.02 MiB
04. Responding to a Cyber Incident/04_04 - Applying forensics to disaster recovery.mp43.26 MiB
04. Responding to a Cyber Incident/04_05 - Reporting cyber incidents.mp49.81 MiB
05. Collecting Evidence/05_01 - Following protocol.mp45.83 MiB
05. Collecting Evidence/05_02 - Storing evidence.mp46.03 MiB
05. Collecting Evidence/05_03 - Imaging evidence.mp44.83 MiB
06. Recovering Evidence/06_01 - Finding hidden data.mp412.24 MiB
06. Recovering Evidence/06_02 - Resurrecting data.mp47.03 MiB
06. Recovering Evidence/06_03 - Working with damaged media.mp46.02 MiB
06. Recovering Evidence/06_04 - Viewing browser history.mp44.57 MiB
06. Recovering Evidence/06_05 - Recovering evidence from a cellular phone.mp44.25 MiB
07. Network-Based Evidence/07_01 - Checking out firewall logs.mp42.75 MiB
07. Network-Based Evidence/07_02 - Detecting network intrusion.mp46.71 MiB
07. Network-Based Evidence/07_03 - Examining router evidence.mp43.91 MiB
08. Windows Forensics/08_01 - Applying forensics to Windows.mp47.21 MiB
08. Windows Forensics/08_02 - Checking the Windows audit log.mp44.92 MiB
08. Windows Forensics/08_03 - Finding Windows directories.mp44.49 MiB
08. Windows Forensics/08_04 - Locating evidence from the Windows Registry.mp45.14 MiB
09. Macintosh Forensics/09_01 - Applying forensics to a Mac.mp46.25 MiB
09. Macintosh Forensics/09_02 - Checking out Mac logs.mp44.46 MiB
09. Macintosh Forensics/09_03 - Finding Mac directories.mp43.56 MiB
10. Linux Forensics/10_01 - Applying forensics to Linux.mp4816.87 KiB
10. Linux Forensics/10_02 - Checking out Linux log files.mp48.92 MiB
10. Linux Forensics/10_03 - Finding Linux directories.mp45.54 MiB
10. Linux Forensics/10_04 - Recovering a deleted file in Linux.mp49.56 MiB
11. Forensic Tools/11_01 - Checking out open-source forensic tools.mp45.64 MiB
11. Forensic Tools/11_02 - Checking out commercial forensic software.mp46.39 MiB
11. Forensic Tools/12_01 - Next steps and resources.mp41.53 MiB
Torrent Downloaded From Katcr.co - Kickasstorrents.txt52 B