FileMood

Download Lynda - Computer Security - Investigation and Response

Lynda Computer Security Investigation and Response

Name

Lynda - Computer Security - Investigation and Response

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

287.0 MB

Total Files

48

Hash

934274DC4A5C741568613CCBDC341330EC626903

/01. Introduction/

01_01-Welcome.mp4

3.9 MB

01_02-What you should know before watching this course.mp4

606.9 KB

/02. Understanding Forensic Science/

02_01-Applying science to digital investigations.mp4

7.3 MB

02_02-Identifying digital evidence.mp4

6.8 MB

02_03-Destroying digital evidence.mp4

8.7 MB

02_04-Using forensic best practices.mp4

7.2 MB

02_05-Examining forensic frameworks.mp4

5.3 MB

02_06-Ensuring scientific relevance.mp4

4.2 MB

/03. Defining Cyber Crime/

03_01-Classifying cyber crime.mp4

4.5 MB

03_02-Defining identity theft.mp4

9.3 MB

03_03-Examining cyber harassment.mp4

9.6 MB

03_04-Explaining hacking techniques.mp4

6.0 MB

03_05-Differentiating nonaccess crimes.mp4

11.1 MB

/04. Setting Up a Forensic Lab/

04_01-Building a knowledgebase.mp4

6.5 MB

04_02-Working with evidence.mp4

3.3 MB

04_03-Equipping the lab.mp4

3.2 MB

04_04-Considering legal implications.mp4

5.6 MB

04_05-Selecting forensic software.mp4

6.2 MB

/05. Responding to a Cyber Incident/

05_01-Discovering an incident.mp4

7.7 MB

05_02-Differentiating between postmortem and live forensics.mp4

5.5 MB

05_03-Preserving evidence.mp4

5.3 MB

05_04-Applying forensics to disaster recovery.mp4

3.5 MB

05_05-Reporting cyber incidents.mp4

10.3 MB

/06. Collecting Evidence/

06_01-Following protocol.mp4

6.3 MB

06_02-Storing evidence.mp4

6.4 MB

06_03-Imaging evidence.mp4

5.1 MB

/07. Recovering Evidence/

07_01-Finding hidden data.mp4

12.6 MB

07_02-Resurrecting data.mp4

7.4 MB

07_03-Working with damaged media.mp4

6.3 MB

07_04-Viewing browser history.mp4

4.8 MB

07_05-Recovering evidence from a cellular phone.mp4

4.5 MB

/08. NetworkBased Evidence/

08_01-Checking out firewall logs.mp4

3.0 MB

08_02-Detecting network intrusion.mp4

7.1 MB

08_03-Examining router evidence.mp4

4.1 MB

/09. Windows Forensics/

09_01-Applying forensics to Windows.mp4

7.5 MB

09_02-Checking the Windows audit log.mp4

5.1 MB

09_03-Finding Windows directories.mp4

4.8 MB

09_04-Locating evidence from the Windows Registry.mp4

5.4 MB

/10. Macintosh Forensics/

10_01-Applying forensics to a Mac.mp4

6.5 MB

10_02-Checking out Mac logs.mp4

4.7 MB

10_03-Finding Mac directories.mp4

3.7 MB

/11. Linux Forensics/

11_01-Applying forensics to Linux.mp4

855.1 KB

11_02-Checking out Linux log files.mp4

9.4 MB

11_03-Finding Linux directories.mp4

5.8 MB

11_04-Recovering a deleted file in Linux.mp4

10.0 MB

/12. Forensic Tools/

12_01-Checking out opensource forensic tools.mp4

6.0 MB

12_02-Checking out commercial forensic software.mp4

6.7 MB

/13. Conclusion/

13_01-Next steps and resources.mp4

1.6 MB

 

Total files 48


Copyright © 2025 FileMood.com