本站已收录 番号和无损神作磁力链接/BT种子 

Lynda - Computer Security_Investigation and Response

种子简介

种子名称: Lynda - Computer Security_Investigation and Response
文件类型:
文件数目: 48个文件
文件大小: 273.73 MB
收录时间: 2015-12-19 16:37
已经下载: 3
资源热度: 67
最近下载: 2024-9-13 17:02

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:E7E101DB2819B9AC8199E084821EF1C57D98B90D&dn=Lynda - Computer Security_Investigation and Response 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

Lynda - Computer Security_Investigation and Response.torrent
  • 027 Finding hidden data.mp412.03MB
  • 013 Differentiating nonaccess crimes.mp410.63MB
  • 023 Reporting cyber incidents.mp49.85MB
  • 045 Recovering a deleted file in Linux.mp49.58MB
  • 011 Examining cyber harassment.mp49.15MB
  • 043 Checking out Linux log files.mp48.97MB
  • 010 Defining identity theft.mp48.9MB
  • 005 Destroying digital evidence.mp48.33MB
  • 019 Discovering an incident.mp47.36MB
  • 035 Applying forensics to Windows.mp47.11MB
  • 028 Resurrecting data.mp47.05MB
  • 003 Applying science to digital investigations.mp46.94MB
  • 006 Using forensic best practices.mp46.84MB
  • 033 Detecting network intrusion.mp46.73MB
  • 004 Identifying digital evidence.mp46.49MB
  • 047 Checking out commercial forensic software.mp46.41MB
  • 039 Applying forensics to a Mac.mp46.22MB
  • 014 Building a knowledgebase.mp46.18MB
  • 025 Storing evidence.mp46.06MB
  • 029 Working with damaged media.mp45.99MB
  • 024 Following protocol.mp45.96MB
  • 018 Selecting forensic software.mp45.87MB
  • 046 Checking out open-source forensic tools.mp45.69MB
  • 012 Explaining hacking techniques.mp45.68MB
  • 044 Finding Linux directories.mp45.57MB
  • 017 Considering legal implications.mp45.36MB
  • 020 Differentiating between postmortem and live forensics.mp45.22MB
  • 038 Locating evidence from the Windows Registry.mp45.16MB
  • 021 Preserving evidence.mp45.04MB
  • 007 Examining forensic frameworks.mp45.02MB
  • 026 Imaging evidence.mp44.86MB
  • 036 Checking the Windows audit log.mp44.84MB
  • 030 Viewing browser history.mp44.58MB
  • 037 Finding Windows directories.mp44.53MB
  • 040 Checking out Mac logs.mp44.52MB
  • 031 Recovering evidence from a cellular phone.mp44.27MB
  • 009 Classifying cyber crime.mp44.27MB
  • 008 Ensuring scientific relevance.mp43.99MB
  • 034 Examining router evidence.mp43.93MB
  • 001 Welcome.mp43.73MB
  • 041 Finding Mac directories.mp43.55MB
  • 022 Applying forensics to disaster recovery.mp43.29MB
  • 015 Working with evidence.mp43.18MB
  • 016 Equipping the lab.mp43.01MB
  • 032 Checking out firewall logs.mp42.86MB
  • 048 Next steps and resources.mp41.56MB
  • 042 Applying forensics to Linux.mp4835.08KB
  • 002 What you should know before watching this course.mp4592.68KB