种子简介
种子名称:
Lynda - Computer Security_Investigation and Response
文件类型:
文件数目:
48个文件
文件大小:
273.73 MB
收录时间:
2015-12-19 16:37
已经下载:
3次
资源热度:
76
最近下载:
2024-12-27 14:15
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:E7E101DB2819B9AC8199E084821EF1C57D98B90D&dn=Lynda - Computer Security_Investigation and Response
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
Lynda - Computer Security_Investigation and Response.torrent
027 Finding hidden data.mp412.03MB
013 Differentiating nonaccess crimes.mp410.63MB
023 Reporting cyber incidents.mp49.85MB
045 Recovering a deleted file in Linux.mp49.58MB
011 Examining cyber harassment.mp49.15MB
043 Checking out Linux log files.mp48.97MB
010 Defining identity theft.mp48.9MB
005 Destroying digital evidence.mp48.33MB
019 Discovering an incident.mp47.36MB
035 Applying forensics to Windows.mp47.11MB
028 Resurrecting data.mp47.05MB
003 Applying science to digital investigations.mp46.94MB
006 Using forensic best practices.mp46.84MB
033 Detecting network intrusion.mp46.73MB
004 Identifying digital evidence.mp46.49MB
047 Checking out commercial forensic software.mp46.41MB
039 Applying forensics to a Mac.mp46.22MB
014 Building a knowledgebase.mp46.18MB
025 Storing evidence.mp46.06MB
029 Working with damaged media.mp45.99MB
024 Following protocol.mp45.96MB
018 Selecting forensic software.mp45.87MB
046 Checking out open-source forensic tools.mp45.69MB
012 Explaining hacking techniques.mp45.68MB
044 Finding Linux directories.mp45.57MB
017 Considering legal implications.mp45.36MB
020 Differentiating between postmortem and live forensics.mp45.22MB
038 Locating evidence from the Windows Registry.mp45.16MB
021 Preserving evidence.mp45.04MB
007 Examining forensic frameworks.mp45.02MB
026 Imaging evidence.mp44.86MB
036 Checking the Windows audit log.mp44.84MB
030 Viewing browser history.mp44.58MB
037 Finding Windows directories.mp44.53MB
040 Checking out Mac logs.mp44.52MB
031 Recovering evidence from a cellular phone.mp44.27MB
009 Classifying cyber crime.mp44.27MB
008 Ensuring scientific relevance.mp43.99MB
034 Examining router evidence.mp43.93MB
001 Welcome.mp43.73MB
041 Finding Mac directories.mp43.55MB
022 Applying forensics to disaster recovery.mp43.29MB
015 Working with evidence.mp43.18MB
016 Equipping the lab.mp43.01MB
032 Checking out firewall logs.mp42.86MB
048 Next steps and resources.mp41.56MB
042 Applying forensics to Linux.mp4835.08KB
002 What you should know before watching this course.mp4592.68KB