种子简介
种子名称:
Learning Lynda - Computer Security Investigation and Response
文件类型:
视频
文件数目:
48个文件
文件大小:
272.09 MB
收录时间:
2017-9-18 18:25
已经下载:
3次
资源热度:
208
最近下载:
2024-12-13 11:53
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:e7e60ac5ff3e914512dec0f77ef02431f27ec0c4&dn=Learning Lynda - Computer Security Investigation and Response
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
Learning Lynda - Computer Security Investigation and Response.torrent
00. Introduction/00_01 - Welcome.mp42.76MB
00. Introduction/00_02 - What you should know before watching this course.mp4571.72KB
01. Understanding Forensic Science/01_01 - Applying science to digital investigations.mp46.9MB
01. Understanding Forensic Science/01_02 - Identifying digital evidence.mp46.58MB
01. Understanding Forensic Science/01_03 - Destroying digital evidence.mp48.3MB
01. Understanding Forensic Science/01_04 - Using forensic best practices.mp46.78MB
01. Understanding Forensic Science/01_05 - Examining forensic frameworks.mp44.99MB
01. Understanding Forensic Science/01_06 - Ensuring scientific relevance.mp43.99MB
02. Defining Cyber Crime/02_01 - Classifying cyber crime.mp44.24MB
02. Defining Cyber Crime/02_02 - Defining identity theft.mp48.91MB
02. Defining Cyber Crime/02_03 - Examining cyber harassment.mp49.12MB
02. Defining Cyber Crime/02_04 - Explaining hacking techniques.mp45.72MB
02. Defining Cyber Crime/02_05 - Differentiating nonaccess crimes.mp410.59MB
03. Setting Up a Forensic Lab/03_01 - Building a knowledgebase.mp46.13MB
03. Setting Up a Forensic Lab/03_02 - Working with evidence.mp43.16MB
03. Setting Up a Forensic Lab/03_03 - Equipping the lab.mp42.99MB
03. Setting Up a Forensic Lab/03_04 - Considering legal implications.mp45.31MB
03. Setting Up a Forensic Lab/03_05 - Selecting forensic software.mp45.85MB
04. Responding to a Cyber Incident/04_01 - Discovering an incident.mp47.39MB
04. Responding to a Cyber Incident/04_02 - Differentiating between postmortem and live forensics.mp45.19MB
04. Responding to a Cyber Incident/04_03 - Preserving evidence.mp45.02MB
04. Responding to a Cyber Incident/04_04 - Applying forensics to disaster recovery.mp43.26MB
04. Responding to a Cyber Incident/04_05 - Reporting cyber incidents.mp49.81MB
05. Collecting Evidence/05_01 - Following protocol.mp45.83MB
05. Collecting Evidence/05_02 - Storing evidence.mp46.03MB
05. Collecting Evidence/05_03 - Imaging evidence.mp44.83MB
06. Recovering Evidence/06_01 - Finding hidden data.mp412.24MB
06. Recovering Evidence/06_02 - Resurrecting data.mp47.03MB
06. Recovering Evidence/06_03 - Working with damaged media.mp46.02MB
06. Recovering Evidence/06_04 - Viewing browser history.mp44.57MB
06. Recovering Evidence/06_05 - Recovering evidence from a cellular phone.mp44.25MB
07. Network-Based Evidence/07_01 - Checking out firewall logs.mp42.75MB
07. Network-Based Evidence/07_02 - Detecting network intrusion.mp46.71MB
07. Network-Based Evidence/07_03 - Examining router evidence.mp43.91MB
08. Windows Forensics/08_01 - Applying forensics to Windows.mp47.21MB
08. Windows Forensics/08_02 - Checking the Windows audit log.mp44.92MB
08. Windows Forensics/08_03 - Finding Windows directories.mp44.49MB
08. Windows Forensics/08_04 - Locating evidence from the Windows Registry.mp45.14MB
09. Macintosh Forensics/09_01 - Applying forensics to a Mac.mp46.25MB
09. Macintosh Forensics/09_02 - Checking out Mac logs.mp44.46MB
09. Macintosh Forensics/09_03 - Finding Mac directories.mp43.56MB
10. Linux Forensics/10_01 - Applying forensics to Linux.mp4816.87KB
10. Linux Forensics/10_02 - Checking out Linux log files.mp48.92MB
10. Linux Forensics/10_03 - Finding Linux directories.mp45.54MB
10. Linux Forensics/10_04 - Recovering a deleted file in Linux.mp49.56MB
11. Forensic Tools/11_01 - Checking out open-source forensic tools.mp45.64MB
11. Forensic Tools/11_02 - Checking out commercial forensic software.mp46.39MB
11. Forensic Tools/12_01 - Next steps and resources.mp41.53MB