Learning Lynda - Computer Security Investigation and Response

mp4   Hot:1774   Size:272.09 MB   Created:2017-08-27 04:04:06   Update:2021-12-12 00:58:41  

File List

  • 00. Introduction/00_01 - Welcome.mp4 2.76 MB
    00. Introduction/00_02 - What you should know before watching this course.mp4 571.72 KB
    01. Understanding Forensic Science/01_01 - Applying science to digital investigations.mp4 6.9 MB
    01. Understanding Forensic Science/01_02 - Identifying digital evidence.mp4 6.58 MB
    01. Understanding Forensic Science/01_03 - Destroying digital evidence.mp4 8.3 MB
    01. Understanding Forensic Science/01_04 - Using forensic best practices.mp4 6.78 MB
    01. Understanding Forensic Science/01_05 - Examining forensic frameworks.mp4 4.99 MB
    01. Understanding Forensic Science/01_06 - Ensuring scientific relevance.mp4 3.99 MB
    02. Defining Cyber Crime/02_01 - Classifying cyber crime.mp4 4.24 MB
    02. Defining Cyber Crime/02_02 - Defining identity theft.mp4 8.91 MB
    02. Defining Cyber Crime/02_03 - Examining cyber harassment.mp4 9.12 MB
    02. Defining Cyber Crime/02_04 - Explaining hacking techniques.mp4 5.72 MB
    02. Defining Cyber Crime/02_05 - Differentiating nonaccess crimes.mp4 10.59 MB
    03. Setting Up a Forensic Lab/03_01 - Building a knowledgebase.mp4 6.13 MB
    03. Setting Up a Forensic Lab/03_02 - Working with evidence.mp4 3.16 MB
    03. Setting Up a Forensic Lab/03_03 - Equipping the lab.mp4 2.99 MB
    03. Setting Up a Forensic Lab/03_04 - Considering legal implications.mp4 5.31 MB
    03. Setting Up a Forensic Lab/03_05 - Selecting forensic software.mp4 5.85 MB
    04. Responding to a Cyber Incident/04_01 - Discovering an incident.mp4 7.39 MB
    04. Responding to a Cyber Incident/04_02 - Differentiating between postmortem and live forensics.mp4 5.19 MB
    04. Responding to a Cyber Incident/04_03 - Preserving evidence.mp4 5.02 MB
    04. Responding to a Cyber Incident/04_04 - Applying forensics to disaster recovery.mp4 3.26 MB
    04. Responding to a Cyber Incident/04_05 - Reporting cyber incidents.mp4 9.81 MB
    05. Collecting Evidence/05_01 - Following protocol.mp4 5.83 MB
    05. Collecting Evidence/05_02 - Storing evidence.mp4 6.03 MB
    05. Collecting Evidence/05_03 - Imaging evidence.mp4 4.83 MB
    06. Recovering Evidence/06_01 - Finding hidden data.mp4 12.24 MB
    06. Recovering Evidence/06_02 - Resurrecting data.mp4 7.03 MB
    06. Recovering Evidence/06_03 - Working with damaged media.mp4 6.02 MB
    06. Recovering Evidence/06_04 - Viewing browser history.mp4 4.57 MB
    06. Recovering Evidence/06_05 - Recovering evidence from a cellular phone.mp4 4.25 MB
    07. Network-Based Evidence/07_01 - Checking out firewall logs.mp4 2.75 MB
    07. Network-Based Evidence/07_02 - Detecting network intrusion.mp4 6.71 MB
    07. Network-Based Evidence/07_03 - Examining router evidence.mp4 3.91 MB
    08. Windows Forensics/08_01 - Applying forensics to Windows.mp4 7.21 MB
    08. Windows Forensics/08_02 - Checking the Windows audit log.mp4 4.92 MB
    08. Windows Forensics/08_03 - Finding Windows directories.mp4 4.49 MB
    08. Windows Forensics/08_04 - Locating evidence from the Windows Registry.mp4 5.14 MB
    09. Macintosh Forensics/09_01 - Applying forensics to a Mac.mp4 6.25 MB
    09. Macintosh Forensics/09_02 - Checking out Mac logs.mp4 4.46 MB
    09. Macintosh Forensics/09_03 - Finding Mac directories.mp4 3.56 MB
    10. Linux Forensics/10_01 - Applying forensics to Linux.mp4 816.87 KB
    10. Linux Forensics/10_02 - Checking out Linux log files.mp4 8.92 MB
    10. Linux Forensics/10_03 - Finding Linux directories.mp4 5.54 MB
    10. Linux Forensics/10_04 - Recovering a deleted file in Linux.mp4 9.56 MB
    11. Forensic Tools/11_01 - Checking out open-source forensic tools.mp4 5.64 MB
    11. Forensic Tools/11_02 - Checking out commercial forensic software.mp4 6.39 MB
    11. Forensic Tools/12_01 - Next steps and resources.mp4 1.53 MB
    Torrent Downloaded From Katcr.co - Kickasstorrents.txt 52 B

Download Info

  • Tips

    “Learning Lynda - Computer Security Investigation and Response” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.