FileMood

Download Learning_Computer_Security_Investigation_and_Response

Learning Computer Security Investigation and Response

Name

Learning_Computer_Security_Investigation_and_Response

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

286.1 MB

Total Files

48

Hash

C524A6716378AF012C2BB3F2CA957839603875C3

/10_9._Macintosh_Forensics/

39_Applying_forensics_to_a_Mac.mp4

6.6 MB

40_Checking_out_Mac_logs.mp4

4.7 MB

41_Finding_Mac_directories.mp4

3.7 MB

/11_10._Linux_Forensics/

42_Applying_forensics_to_Linux.mp4

845.4 KB

43_Checking_out_Linux_log_files.mp4

9.4 MB

44_Finding_Linux_directories.mp4

5.8 MB

45_Recovering_a_deleted_file_in_Linux.mp4

10.0 MB

/12_11._Forensic_Tools/

46_Checking_out_open-source_forensic_tools.mp4

5.9 MB

47_Checking_out_commercial_forensic_software.mp4

6.7 MB

/13_Conclusion/

48_Next_steps_and_resources.mp4

1.6 MB

/1_Introduction/

01_Welcome.mp4

2.9 MB

02_What_you_should_know_before_watching_this_course.mp4

594.5 KB

/2_1._Understanding_Forensic_Science/

03_Applying_science_to_digital_investigations.mp4

7.3 MB

04_Identifying_digital_evidence.mp4

6.9 MB

05_Destroying_digital_evidence.mp4

8.7 MB

06_Using_forensic_best_practices.mp4

7.1 MB

07_Examining_forensic_frameworks.mp4

5.2 MB

08_Ensuring_scientific_relevance.mp4

4.2 MB

/3_2._Defining_Cyber_Crime/

09_Classifying_cyber_crime.mp4

4.5 MB

10_Defining_identity_theft.mp4

9.4 MB

11_Examining_cyber_harassment.mp4

9.6 MB

12_Explaining_hacking_techniques.mp4

6.0 MB

13_Differentiating_nonaccess_crimes.mp4

11.1 MB

/4_3._Setting_Up_a_Forensic_Lab/

14_Building_a_knowledgebase.mp4

6.4 MB

15_Working_with_evidence.mp4

3.3 MB

16_Equipping_the_lab.mp4

3.1 MB

17_Considering_legal_implications.mp4

5.6 MB

18_Selecting_forensic_software.mp4

6.1 MB

/5_4._Responding_to_a_Cyber_Incident/

19_Discovering_an_incident.mp4

7.8 MB

20_Differentiating_between_postmortem_and_live_forensics.mp4

5.5 MB

21_Preserving_evidence.mp4

5.3 MB

22_Applying_forensics_to_disaster_recovery.mp4

3.4 MB

23_Reporting_cyber_incidents.mp4

10.3 MB

/6_5._Collecting_Evidence/

24_Following_protocol.mp4

6.1 MB

25_Storing_evidence.mp4

6.3 MB

26_Imaging_evidence.mp4

5.1 MB

/7_6._Recovering_Evidence/

27_Finding_hidden_data.mp4

12.9 MB

28_Resurrecting_data.mp4

7.4 MB

29_Working_with_damaged_media.mp4

6.3 MB

30_Viewing_browser_history.mp4

4.8 MB

31_Recovering_evidence_from_a_cellular_phone.mp4

4.5 MB

/8_7._Network-Based_Evidence/

32_Checking_out_firewall_logs.mp4

2.9 MB

33_Detecting_network_intrusion.mp4

7.1 MB

34_Examining_router_evidence.mp4

4.1 MB

/9_8._Windows_Forensics/

35_Applying_forensics_to_Windows.mp4

7.6 MB

36_Checking_the_Windows_audit_log.mp4

5.2 MB

37_Finding_Windows_directories.mp4

4.7 MB

38_Locating_evidence_from_the_Windows_Registry.mp4

5.4 MB

 

Total files 48


Copyright © 2025 FileMood.com