Learning_Computer_Forensics
- 收录时间:2018-04-03 09:25:51
- 文件大小:294MB
- 下载次数:32
- 最近下载:2020-11-07 03:04:26
- 磁力链接:
-
文件列表
- 4_3._Preserving_Data/16_Using_a_hardware_write_blocker.mp4 14MB
- 4_3._Preserving_Data/15_Using_a_software_write_blocker.mp4 12MB
- 6_5._Analyzing_Data/38_Understanding_the_master_boot_record_MBR.mp4 12MB
- 5_4._Acquiring_Data/23_Static_acquisition_with_an_open-source_tool.mp4 11MB
- 6_5._Analyzing_Data/36_Understanding_the_boot_sequence.mp4 11MB
- 3_2._Preparing_for_a_Computer_Forensics_Investigation/11_Understanding_hexadecimal_numbers.mp4 11MB
- 4_3._Preserving_Data/20_Mounting_manually.mp4 10MB
- 6_5._Analyzing_Data/39_Hex_editor_analysis_of_a_file_with_a_wrong_extension.mp4 10MB
- 5_4._Acquiring_Data/29_Memory_dump_analysis_with_Volatility.mp4 10MB
- 5_4._Acquiring_Data/31_Remote_acquisition_with_a_commercial_tool.mp4 10MB
- 6_5._Analyzing_Data/35_Understanding_file_systems.mp4 10MB
- 4_3._Preserving_Data/19_Understanding_mounting.mp4 10MB
- 6_5._Analyzing_Data/33_Searching.mp4 9MB
- 4_3._Preserving_Data/17_Understanding_hashing_and_its_role_in_ensuring_data_integrity.mp4 9MB
- 6_5._Analyzing_Data/34_Generating_a_report.mp4 9MB
- 5_4._Acquiring_Data/24_Creating_split-disk_image_files_with_DD.mp4 9MB
- 3_2._Preparing_for_a_Computer_Forensics_Investigation/12_Using_a_hex_editor.mp4 8MB
- 5_4._Acquiring_Data/25_Static_acquisition_with_dcfldd_forensic_DD.mp4 8MB
- 5_4._Acquiring_Data/26_Static_acquisition_with_a_commercial_tool.mp4 7MB
- 5_4._Acquiring_Data/28_Live_acquisition_with_FTK_Imager.mp4 7MB
- 4_3._Preserving_Data/21_Hashing_in_computer_forensics_tools.mp4 7MB
- 3_2._Preparing_for_a_Computer_Forensics_Investigation/09_Computer_forensics_certifications.mp4 7MB
- 3_2._Preparing_for_a_Computer_Forensics_Investigation/07_Computer_forensics_hardware.mp4 7MB
- 2_1._Understanding_Computer_Forensics/05_Computer_forensics_tools.mp4 6MB
- 6_5._Analyzing_Data/37_Understanding_disk_drives.mp4 6MB
- 6_5._Analyzing_Data/40_Hex_editor_analysis_of_a_bit-shifted_file.mp4 6MB
- 3_2._Preparing_for_a_Computer_Forensics_Investigation/10_Understanding_partitioning.mp4 6MB
- 2_1._Understanding_Computer_Forensics/06_Legal_implications.mp4 6MB
- 4_3._Preserving_Data/14_Understanding_the_role_of_write_blockers_in_preserving_data_integrity.mp4 6MB
- 3_2._Preparing_for_a_Computer_Forensics_Investigation/13_Understanding_an_offset.mp4 5MB
- 2_1._Understanding_Computer_Forensics/04_Types_of_computer_forensics_investigations.mp4 5MB
- 1_Introduction/01_Welcome.mp4 5MB
- 6_5._Analyzing_Data/32_Indexing.mp4 4MB
- 4_3._Preserving_Data/18_Hashing_algorithms.mp4 4MB
- 2_1._Understanding_Computer_Forensics/03_Goals_of_computer_forensics.mp4 4MB
- 3_2._Preparing_for_a_Computer_Forensics_Investigation/08_Computer_forensics_software.mp4 4MB
- 7_Conclusion/41_Next_steps.mp4 3MB
- 5_4._Acquiring_Data/30_Remote_acquisition.mp4 3MB
- 1_Introduction/02_Using_the_exercise_files.mp4 2MB
- 5_4._Acquiring_Data/27_Live_acquisition.mp4 1MB
- 5_4._Acquiring_Data/22_Static_acquisition.mp4 1MB