Computer Forensics 收录时间:2020-06-23 07:06:55 文件大小:513MB 下载次数:1 最近下载:2020-06-23 07:06:55 磁力链接: magnet:?xt=urn:btih:e3a38df889e31069c50e97607bfabdd4d5699ef3 立即下载 复制链接 文件列表 Computer Forensics/Ex_Files_Comp_Forensics_EssT.zip 173MB Computer Forensics/6. Preserving Data/08 - Understanding mounting.mp4 14MB Computer Forensics/4. Preparing for an Investigation/07 - Forensics OS distributions.mp4 11MB Computer Forensics/8. Analyzing Data/03 - Searching.mp4 10MB Computer Forensics/7. Acquiring Data/06 - Memory dump analysis with volatility.mp4 10MB Computer Forensics/2. Understanding Computer Forensics/07 - Challenges.mp4 9MB Computer Forensics/6. Preserving Data/09 - Mounting manually.mp4 9MB Computer Forensics/2. Understanding Computer Forensics/08 - Anti-forensics techniques.mp4 9MB Computer Forensics/3. Careers/06 - Malware forensics.mp4 8MB Computer Forensics/7. Acquiring Data/02 - Static acquisition with open-source tools.mp4 8MB Computer Forensics/5. File System Fundamentals/01 - Understanding file systems.mp4 8MB Computer Forensics/3. Careers/08 - Email forensics.mp4 8MB Computer Forensics/3. Careers/02 - Network forensics.mp4 7MB Computer Forensics/3. Careers/03 - Operating system forensics.mp4 7MB Computer Forensics/8. Analyzing Data/05 - Hex editor analysis of a file with a wrong extension.mp4 7MB Computer Forensics/7. Acquiring Data/04 - Static acquisition with dcfldd.mp4 7MB Computer Forensics/3. Careers/05 - Cloud forensics.mp4 7MB Computer Forensics/6. Preserving Data/07 - Hashing in FTK Imager.mp4 7MB Computer Forensics/4. Preparing for an Investigation/05 - Using a hex editor.mp4 7MB Computer Forensics/3. Careers/01 - Specializations in computer forensics.mp4 7MB Computer Forensics/7. Acquiring Data/03 - Creating split-disk image files with dd.mp4 7MB Computer Forensics/2. Understanding Computer Forensics/06 - Current and future trends.mp4 7MB Computer Forensics/6. Preserving Data/05 - Understanding hashing.mp4 7MB Computer Forensics/6. Preserving Data/03 - Using a software write blocker.mp4 7MB Computer Forensics/7. Acquiring Data/05 - Live acquisition with a commercial tool.mp4 6MB Computer Forensics/2. Understanding Computer Forensics/04 - Tools.mp4 6MB Computer Forensics/4. Preparing for an Investigation/04 - Understanding hexadecimal (hex) numbers.mp4 6MB Computer Forensics/8. Analyzing Data/07 - Steganography.mp4 6MB Computer Forensics/3. Careers/04 - Web forensics.mp4 6MB Computer Forensics/6. Preserving Data/04 - Using hardware write blockers.mp4 6MB Computer Forensics/3. Careers/07 - Mobile forensics.mp4 6MB Computer Forensics/4. Preparing for an Investigation/02 - Hardware.mp4 6MB Computer Forensics/8. Analyzing Data/04 - Generating a report.mp4 5MB Computer Forensics/2. Understanding Computer Forensics/02 - History.mp4 5MB Computer Forensics/2. Understanding Computer Forensics/05 - Legal implications.mp4 5MB Computer Forensics/2. Understanding Computer Forensics/09 - Compliance and forensics.mp4 5MB Computer Forensics/1. Introduction/01 - Learning computer forensics.mp4 5MB Computer Forensics/2. Understanding Computer Forensics/10 - Cybersecurity and forensics.mp4 5MB Computer Forensics/5. File System Fundamentals/02 - Understanding the boot sequence.mp4 5MB Computer Forensics/2. Understanding Computer Forensics/03 - Types of investigations.mp4 5MB Computer Forensics/6. Preserving Data/01 - Evidence preservation approaches.mp4 5MB Computer Forensics/8. Analyzing Data/06 - Hex editor analysis of a bit-shifted file.mp4 5MB Computer Forensics/8. Analyzing Data/01 - Forensic data analysis.mp4 5MB Computer Forensics/5. File System Fundamentals/03 - Understanding disk drives.mp4 4MB Computer Forensics/5. File System Fundamentals/05 - Understanding partitioning.mp4 4MB Computer Forensics/1. Introduction/02 - What you should know.mp4 4MB Computer Forensics/6. Preserving Data/02 - Understanding the role of write blockers.mp4 4MB Computer Forensics/4. Preparing for an Investigation/01 - Tools and knowledge requirements.mp4 4MB Computer Forensics/7. Acquiring Data/01 - Data acquisition approaches.mp4 4MB Computer Forensics/3. Careers/09 - Certifications.mp4 4MB Computer Forensics/4. Preparing for an Investigation/03 - Software.mp4 3MB Computer Forensics/4. Preparing for an Investigation/06 - Understanding an offset.mp4 3MB Computer Forensics/8. Analyzing Data/02 - Indexing.mp4 3MB Computer Forensics/9. Conclusion/01 - Next steps.mp4 3MB Computer Forensics/6. Preserving Data/06 - Hashing algorithms.mp4 3MB Computer Forensics/5. File System Fundamentals/04 - Understanding the master boot record (MBR).mp4 3MB Computer Forensics/2. Understanding Computer Forensics/01 - Goals of computer forensics.mp4 2MB Computer Forensics/3. Careers/01 - Specializations in computer forensics.en.srt 6KB Computer Forensics/6. Preserving Data/08 - Understanding mounting.en.srt 6KB Computer Forensics/3. Careers/08 - Email forensics.en.srt 6KB Computer Forensics/5. File System Fundamentals/01 - Understanding file systems.en.srt 6KB Computer Forensics/3. Careers/06 - Malware forensics.en.srt 6KB Computer Forensics/6. Preserving Data/05 - Understanding hashing.en.srt 6KB Computer Forensics/3. Careers/04 - Web forensics.en.srt 6KB Computer Forensics/8. Analyzing Data/03 - Searching.en.srt 5KB Computer Forensics/4. Preparing for an Investigation/05 - Using a hex editor.en.srt 5KB Computer Forensics/3. Careers/05 - Cloud forensics.en.srt 5KB Computer Forensics/2. Understanding Computer Forensics/08 - Anti-forensics techniques.en.srt 5KB Computer Forensics/7. Acquiring Data/02 - Static acquisition with open-source tools.en.srt 5KB Computer Forensics/3. Careers/03 - Operating system forensics.en.srt 5KB Computer Forensics/2. Understanding Computer Forensics/07 - Challenges.en.srt 5KB Computer Forensics/3. Careers/02 - Network forensics.en.srt 5KB Computer Forensics/2. Understanding Computer Forensics/06 - Current and future trends.en.srt 5KB Computer Forensics/4. Preparing for an Investigation/04 - Understanding hexadecimal (hex) numbers.en.srt 5KB Computer Forensics/7. Acquiring Data/06 - Memory dump analysis with volatility.en.srt 5KB Computer Forensics/6. Preserving Data/03 - Using a software write blocker.en.srt 5KB Computer Forensics/3. Careers/07 - Mobile forensics.en.srt 5KB Computer Forensics/2. Understanding Computer Forensics/05 - Legal implications.en.srt 5KB Computer Forensics/4. Preparing for an Investigation/07 - Forensics OS distributions.en.srt 5KB Computer Forensics/6. Preserving Data/07 - Hashing in FTK Imager.en.srt 4KB Computer Forensics/7. Acquiring Data/04 - Static acquisition with dcfldd.en.srt 4KB Computer Forensics/2. Understanding Computer Forensics/02 - History.en.srt 4KB Computer Forensics/6. Preserving Data/09 - Mounting manually.en.srt 4KB Computer Forensics/2. Understanding Computer Forensics/04 - Tools.en.srt 4KB Computer Forensics/8. Analyzing Data/05 - Hex editor analysis of a file with a wrong extension.en.srt 4KB Computer Forensics/6. Preserving Data/04 - Using hardware write blockers.en.srt 4KB Computer Forensics/4. Preparing for an Investigation/02 - Hardware.en.srt 4KB Computer Forensics/2. Understanding Computer Forensics/09 - Compliance and forensics.en.srt 4KB Computer Forensics/8. Analyzing Data/01 - Forensic data analysis.en.srt 4KB Computer Forensics/6. Preserving Data/01 - Evidence preservation approaches.en.srt 4KB Computer Forensics/8. Analyzing Data/07 - Steganography.en.srt 4KB Computer Forensics/5. File System Fundamentals/02 - Understanding the boot sequence.en.srt 4KB Computer Forensics/7. Acquiring Data/03 - Creating split-disk image files with dd.en.srt 4KB Computer Forensics/2. Understanding Computer Forensics/10 - Cybersecurity and forensics.en.srt 3KB Computer Forensics/6. Preserving Data/02 - Understanding the role of write blockers.en.srt 3KB Computer Forensics/3. Careers/09 - Certifications.en.srt 3KB Computer Forensics/4. Preparing for an Investigation/03 - Software.en.srt 3KB Computer Forensics/5. File System Fundamentals/05 - Understanding partitioning.en.srt 3KB Computer Forensics/5. File System Fundamentals/03 - Understanding disk drives.en.srt 3KB Computer Forensics/7. Acquiring Data/01 - Data acquisition approaches.en.srt 3KB Computer Forensics/4. Preparing for an Investigation/01 - Tools and knowledge requirements.en.srt 3KB Computer Forensics/8. Analyzing Data/04 - Generating a report.en.srt 3KB Computer Forensics/2. Understanding Computer Forensics/03 - Types of investigations.en.srt 3KB Computer Forensics/8. Analyzing Data/06 - Hex editor analysis of a bit-shifted file.en.srt 3KB Computer Forensics/7. Acquiring Data/05 - Live acquisition with a commercial tool.en.srt 3KB Computer Forensics/4. Preparing for an Investigation/06 - Understanding an offset.en.srt 3KB Computer Forensics/5. File System Fundamentals/04 - Understanding the master boot record (MBR).en.srt 3KB Computer Forensics/8. Analyzing Data/02 - Indexing.en.srt 3KB Computer Forensics/1. Introduction/02 - What you should know.en.srt 2KB Computer Forensics/6. Preserving Data/06 - Hashing algorithms.en.srt 2KB Computer Forensics/2. Understanding Computer Forensics/01 - Goals of computer forensics.en.srt 2KB Computer Forensics/9. Conclusion/01 - Next steps.en.srt 2KB Computer Forensics/1. Introduction/01 - Learning computer forensics.en.srt 1KB Computer Forensics/README..txt 1KB