589689.xyz

Computer Forensics

  • 收录时间:2020-06-23 07:06:55
  • 文件大小:513MB
  • 下载次数:1
  • 最近下载:2020-06-23 07:06:55
  • 磁力链接:

文件列表

  1. Computer Forensics/Ex_Files_Comp_Forensics_EssT.zip 173MB
  2. Computer Forensics/6. Preserving Data/08 - Understanding mounting.mp4 14MB
  3. Computer Forensics/4. Preparing for an Investigation/07 - Forensics OS distributions.mp4 11MB
  4. Computer Forensics/8. Analyzing Data/03 - Searching.mp4 10MB
  5. Computer Forensics/7. Acquiring Data/06 - Memory dump analysis with volatility.mp4 10MB
  6. Computer Forensics/2. Understanding Computer Forensics/07 - Challenges.mp4 9MB
  7. Computer Forensics/6. Preserving Data/09 - Mounting manually.mp4 9MB
  8. Computer Forensics/2. Understanding Computer Forensics/08 - Anti-forensics techniques.mp4 9MB
  9. Computer Forensics/3. Careers/06 - Malware forensics.mp4 8MB
  10. Computer Forensics/7. Acquiring Data/02 - Static acquisition with open-source tools.mp4 8MB
  11. Computer Forensics/5. File System Fundamentals/01 - Understanding file systems.mp4 8MB
  12. Computer Forensics/3. Careers/08 - Email forensics.mp4 8MB
  13. Computer Forensics/3. Careers/02 - Network forensics.mp4 7MB
  14. Computer Forensics/3. Careers/03 - Operating system forensics.mp4 7MB
  15. Computer Forensics/8. Analyzing Data/05 - Hex editor analysis of a file with a wrong extension.mp4 7MB
  16. Computer Forensics/7. Acquiring Data/04 - Static acquisition with dcfldd.mp4 7MB
  17. Computer Forensics/3. Careers/05 - Cloud forensics.mp4 7MB
  18. Computer Forensics/6. Preserving Data/07 - Hashing in FTK Imager.mp4 7MB
  19. Computer Forensics/4. Preparing for an Investigation/05 - Using a hex editor.mp4 7MB
  20. Computer Forensics/3. Careers/01 - Specializations in computer forensics.mp4 7MB
  21. Computer Forensics/7. Acquiring Data/03 - Creating split-disk image files with dd.mp4 7MB
  22. Computer Forensics/2. Understanding Computer Forensics/06 - Current and future trends.mp4 7MB
  23. Computer Forensics/6. Preserving Data/05 - Understanding hashing.mp4 7MB
  24. Computer Forensics/6. Preserving Data/03 - Using a software write blocker.mp4 7MB
  25. Computer Forensics/7. Acquiring Data/05 - Live acquisition with a commercial tool.mp4 6MB
  26. Computer Forensics/2. Understanding Computer Forensics/04 - Tools.mp4 6MB
  27. Computer Forensics/4. Preparing for an Investigation/04 - Understanding hexadecimal (hex) numbers.mp4 6MB
  28. Computer Forensics/8. Analyzing Data/07 - Steganography.mp4 6MB
  29. Computer Forensics/3. Careers/04 - Web forensics.mp4 6MB
  30. Computer Forensics/6. Preserving Data/04 - Using hardware write blockers.mp4 6MB
  31. Computer Forensics/3. Careers/07 - Mobile forensics.mp4 6MB
  32. Computer Forensics/4. Preparing for an Investigation/02 - Hardware.mp4 6MB
  33. Computer Forensics/8. Analyzing Data/04 - Generating a report.mp4 5MB
  34. Computer Forensics/2. Understanding Computer Forensics/02 - History.mp4 5MB
  35. Computer Forensics/2. Understanding Computer Forensics/05 - Legal implications.mp4 5MB
  36. Computer Forensics/2. Understanding Computer Forensics/09 - Compliance and forensics.mp4 5MB
  37. Computer Forensics/1. Introduction/01 - Learning computer forensics.mp4 5MB
  38. Computer Forensics/2. Understanding Computer Forensics/10 - Cybersecurity and forensics.mp4 5MB
  39. Computer Forensics/5. File System Fundamentals/02 - Understanding the boot sequence.mp4 5MB
  40. Computer Forensics/2. Understanding Computer Forensics/03 - Types of investigations.mp4 5MB
  41. Computer Forensics/6. Preserving Data/01 - Evidence preservation approaches.mp4 5MB
  42. Computer Forensics/8. Analyzing Data/06 - Hex editor analysis of a bit-shifted file.mp4 5MB
  43. Computer Forensics/8. Analyzing Data/01 - Forensic data analysis.mp4 5MB
  44. Computer Forensics/5. File System Fundamentals/03 - Understanding disk drives.mp4 4MB
  45. Computer Forensics/5. File System Fundamentals/05 - Understanding partitioning.mp4 4MB
  46. Computer Forensics/1. Introduction/02 - What you should know.mp4 4MB
  47. Computer Forensics/6. Preserving Data/02 - Understanding the role of write blockers.mp4 4MB
  48. Computer Forensics/4. Preparing for an Investigation/01 - Tools and knowledge requirements.mp4 4MB
  49. Computer Forensics/7. Acquiring Data/01 - Data acquisition approaches.mp4 4MB
  50. Computer Forensics/3. Careers/09 - Certifications.mp4 4MB
  51. Computer Forensics/4. Preparing for an Investigation/03 - Software.mp4 3MB
  52. Computer Forensics/4. Preparing for an Investigation/06 - Understanding an offset.mp4 3MB
  53. Computer Forensics/8. Analyzing Data/02 - Indexing.mp4 3MB
  54. Computer Forensics/9. Conclusion/01 - Next steps.mp4 3MB
  55. Computer Forensics/6. Preserving Data/06 - Hashing algorithms.mp4 3MB
  56. Computer Forensics/5. File System Fundamentals/04 - Understanding the master boot record (MBR).mp4 3MB
  57. Computer Forensics/2. Understanding Computer Forensics/01 - Goals of computer forensics.mp4 2MB
  58. Computer Forensics/3. Careers/01 - Specializations in computer forensics.en.srt 6KB
  59. Computer Forensics/6. Preserving Data/08 - Understanding mounting.en.srt 6KB
  60. Computer Forensics/3. Careers/08 - Email forensics.en.srt 6KB
  61. Computer Forensics/5. File System Fundamentals/01 - Understanding file systems.en.srt 6KB
  62. Computer Forensics/3. Careers/06 - Malware forensics.en.srt 6KB
  63. Computer Forensics/6. Preserving Data/05 - Understanding hashing.en.srt 6KB
  64. Computer Forensics/3. Careers/04 - Web forensics.en.srt 6KB
  65. Computer Forensics/8. Analyzing Data/03 - Searching.en.srt 5KB
  66. Computer Forensics/4. Preparing for an Investigation/05 - Using a hex editor.en.srt 5KB
  67. Computer Forensics/3. Careers/05 - Cloud forensics.en.srt 5KB
  68. Computer Forensics/2. Understanding Computer Forensics/08 - Anti-forensics techniques.en.srt 5KB
  69. Computer Forensics/7. Acquiring Data/02 - Static acquisition with open-source tools.en.srt 5KB
  70. Computer Forensics/3. Careers/03 - Operating system forensics.en.srt 5KB
  71. Computer Forensics/2. Understanding Computer Forensics/07 - Challenges.en.srt 5KB
  72. Computer Forensics/3. Careers/02 - Network forensics.en.srt 5KB
  73. Computer Forensics/2. Understanding Computer Forensics/06 - Current and future trends.en.srt 5KB
  74. Computer Forensics/4. Preparing for an Investigation/04 - Understanding hexadecimal (hex) numbers.en.srt 5KB
  75. Computer Forensics/7. Acquiring Data/06 - Memory dump analysis with volatility.en.srt 5KB
  76. Computer Forensics/6. Preserving Data/03 - Using a software write blocker.en.srt 5KB
  77. Computer Forensics/3. Careers/07 - Mobile forensics.en.srt 5KB
  78. Computer Forensics/2. Understanding Computer Forensics/05 - Legal implications.en.srt 5KB
  79. Computer Forensics/4. Preparing for an Investigation/07 - Forensics OS distributions.en.srt 5KB
  80. Computer Forensics/6. Preserving Data/07 - Hashing in FTK Imager.en.srt 4KB
  81. Computer Forensics/7. Acquiring Data/04 - Static acquisition with dcfldd.en.srt 4KB
  82. Computer Forensics/2. Understanding Computer Forensics/02 - History.en.srt 4KB
  83. Computer Forensics/6. Preserving Data/09 - Mounting manually.en.srt 4KB
  84. Computer Forensics/2. Understanding Computer Forensics/04 - Tools.en.srt 4KB
  85. Computer Forensics/8. Analyzing Data/05 - Hex editor analysis of a file with a wrong extension.en.srt 4KB
  86. Computer Forensics/6. Preserving Data/04 - Using hardware write blockers.en.srt 4KB
  87. Computer Forensics/4. Preparing for an Investigation/02 - Hardware.en.srt 4KB
  88. Computer Forensics/2. Understanding Computer Forensics/09 - Compliance and forensics.en.srt 4KB
  89. Computer Forensics/8. Analyzing Data/01 - Forensic data analysis.en.srt 4KB
  90. Computer Forensics/6. Preserving Data/01 - Evidence preservation approaches.en.srt 4KB
  91. Computer Forensics/8. Analyzing Data/07 - Steganography.en.srt 4KB
  92. Computer Forensics/5. File System Fundamentals/02 - Understanding the boot sequence.en.srt 4KB
  93. Computer Forensics/7. Acquiring Data/03 - Creating split-disk image files with dd.en.srt 4KB
  94. Computer Forensics/2. Understanding Computer Forensics/10 - Cybersecurity and forensics.en.srt 3KB
  95. Computer Forensics/6. Preserving Data/02 - Understanding the role of write blockers.en.srt 3KB
  96. Computer Forensics/3. Careers/09 - Certifications.en.srt 3KB
  97. Computer Forensics/4. Preparing for an Investigation/03 - Software.en.srt 3KB
  98. Computer Forensics/5. File System Fundamentals/05 - Understanding partitioning.en.srt 3KB
  99. Computer Forensics/5. File System Fundamentals/03 - Understanding disk drives.en.srt 3KB
  100. Computer Forensics/7. Acquiring Data/01 - Data acquisition approaches.en.srt 3KB
  101. Computer Forensics/4. Preparing for an Investigation/01 - Tools and knowledge requirements.en.srt 3KB
  102. Computer Forensics/8. Analyzing Data/04 - Generating a report.en.srt 3KB
  103. Computer Forensics/2. Understanding Computer Forensics/03 - Types of investigations.en.srt 3KB
  104. Computer Forensics/8. Analyzing Data/06 - Hex editor analysis of a bit-shifted file.en.srt 3KB
  105. Computer Forensics/7. Acquiring Data/05 - Live acquisition with a commercial tool.en.srt 3KB
  106. Computer Forensics/4. Preparing for an Investigation/06 - Understanding an offset.en.srt 3KB
  107. Computer Forensics/5. File System Fundamentals/04 - Understanding the master boot record (MBR).en.srt 3KB
  108. Computer Forensics/8. Analyzing Data/02 - Indexing.en.srt 3KB
  109. Computer Forensics/1. Introduction/02 - What you should know.en.srt 2KB
  110. Computer Forensics/6. Preserving Data/06 - Hashing algorithms.en.srt 2KB
  111. Computer Forensics/2. Understanding Computer Forensics/01 - Goals of computer forensics.en.srt 2KB
  112. Computer Forensics/9. Conclusion/01 - Next steps.en.srt 2KB
  113. Computer Forensics/1. Introduction/01 - Learning computer forensics.en.srt 1KB
  114. Computer Forensics/README..txt 1KB