BITCQ

Learning Lynda - Computer Security Investigation and Response

Size: 272.1 MB
Magnet link

Name Size
Learning Lynda - Computer Security Investigation and Response/00. Introduction/00_01 - Welcome.mp4 2.8 MB
Learning Lynda - Computer Security Investigation and Response/00. Introduction/00_02 - What you should know before watching this course.mp4 572 KB
Learning Lynda - Computer Security Investigation and Response/01. Understanding Forensic Science/01_01 - Applying science to digital investigations.mp4 6.9 MB
Learning Lynda - Computer Security Investigation and Response/01. Understanding Forensic Science/01_02 - Identifying digital evidence.mp4 6.6 MB
Learning Lynda - Computer Security Investigation and Response/01. Understanding Forensic Science/01_03 - Destroying digital evidence.mp4 8.3 MB
Learning Lynda - Computer Security Investigation and Response/01. Understanding Forensic Science/01_04 - Using forensic best practices.mp4 6.8 MB
Learning Lynda - Computer Security Investigation and Response/01. Understanding Forensic Science/01_05 - Examining forensic frameworks.mp4 5 MB
Learning Lynda - Computer Security Investigation and Response/01. Understanding Forensic Science/01_06 - Ensuring scientific relevance.mp4 4 MB
Learning Lynda - Computer Security Investigation and Response/02. Defining Cyber Crime/02_01 - Classifying cyber crime.mp4 4.2 MB
Learning Lynda - Computer Security Investigation and Response/02. Defining Cyber Crime/02_02 - Defining identity theft.mp4 8.9 MB
Learning Lynda - Computer Security Investigation and Response/02. Defining Cyber Crime/02_03 - Examining cyber harassment.mp4 9.1 MB
Learning Lynda - Computer Security Investigation and Response/02. Defining Cyber Crime/02_04 - Explaining hacking techniques.mp4 5.7 MB
Learning Lynda - Computer Security Investigation and Response/02. Defining Cyber Crime/02_05 - Differentiating nonaccess crimes.mp4 10.6 MB
Learning Lynda - Computer Security Investigation and Response/03. Setting Up a Forensic Lab/03_01 - Building a knowledgebase.mp4 6.1 MB
Learning Lynda - Computer Security Investigation and Response/03. Setting Up a Forensic Lab/03_02 - Working with evidence.mp4 3.2 MB
Learning Lynda - Computer Security Investigation and Response/03. Setting Up a Forensic Lab/03_03 - Equipping the lab.mp4 3 MB
Learning Lynda - Computer Security Investigation and Response/03. Setting Up a Forensic Lab/03_04 - Considering legal implications.mp4 5.3 MB
Learning Lynda - Computer Security Investigation and Response/03. Setting Up a Forensic Lab/03_05 - Selecting forensic software.mp4 5.8 MB
Learning Lynda - Computer Security Investigation and Response/04. Responding to a Cyber Incident/04_01 - Discovering an incident.mp4 7.4 MB
Learning Lynda - Computer Security Investigation and Response/04. Responding to a Cyber Incident/04_02 - Differentiating between postmortem and live forensics.mp4 5.2 MB
Learning Lynda - Computer Security Investigation and Response/04. Responding to a Cyber Incident/04_03 - Preserving evidence.mp4 5 MB
Learning Lynda - Computer Security Investigation and Response/04. Responding to a Cyber Incident/04_04 - Applying forensics to disaster recovery.mp4 3.3 MB
Learning Lynda - Computer Security Investigation and Response/04. Responding to a Cyber Incident/04_05 - Reporting cyber incidents.mp4 9.8 MB
Learning Lynda - Computer Security Investigation and Response/05. Collecting Evidence/05_01 - Following protocol.mp4 5.8 MB
Learning Lynda - Computer Security Investigation and Response/05. Collecting Evidence/05_02 - Storing evidence.mp4 6 MB
Learning Lynda - Computer Security Investigation and Response/05. Collecting Evidence/05_03 - Imaging evidence.mp4 4.8 MB
Learning Lynda - Computer Security Investigation and Response/06. Recovering Evidence/06_01 - Finding hidden data.mp4 12.2 MB
Learning Lynda - Computer Security Investigation and Response/06. Recovering Evidence/06_02 - Resurrecting data.mp4 7 MB
Learning Lynda - Computer Security Investigation and Response/06. Recovering Evidence/06_03 - Working with damaged media.mp4 6 MB
Learning Lynda - Computer Security Investigation and Response/06. Recovering Evidence/06_04 - Viewing browser history.mp4 4.6 MB
Learning Lynda - Computer Security Investigation and Response/06. Recovering Evidence/06_05 - Recovering evidence from a cellular phone.mp4 4.2 MB
Learning Lynda - Computer Security Investigation and Response/07. Network-Based Evidence/07_01 - Checking out firewall logs.mp4 2.8 MB
Learning Lynda - Computer Security Investigation and Response/07. Network-Based Evidence/07_02 - Detecting network intrusion.mp4 6.7 MB
Learning Lynda - Computer Security Investigation and Response/07. Network-Based Evidence/07_03 - Examining router evidence.mp4 3.9 MB
Learning Lynda - Computer Security Investigation and Response/08. Windows Forensics/08_01 - Applying forensics to Windows.mp4 7.2 MB
Learning Lynda - Computer Security Investigation and Response/08. Windows Forensics/08_02 - Checking the Windows audit log.mp4 4.9 MB
Learning Lynda - Computer Security Investigation and Response/08. Windows Forensics/08_03 - Finding Windows directories.mp4 4.5 MB
Learning Lynda - Computer Security Investigation and Response/08. Windows Forensics/08_04 - Locating evidence from the Windows Registry.mp4 5.1 MB
Learning Lynda - Computer Security Investigation and Response/09. Macintosh Forensics/09_01 - Applying forensics to a Mac.mp4 6.3 MB
Learning Lynda - Computer Security Investigation and Response/09. Macintosh Forensics/09_02 - Checking out Mac logs.mp4 4.5 MB
Learning Lynda - Computer Security Investigation and Response/09. Macintosh Forensics/09_03 - Finding Mac directories.mp4 3.6 MB
Learning Lynda - Computer Security Investigation and Response/10. Linux Forensics/10_01 - Applying forensics to Linux.mp4 817 KB
Learning Lynda - Computer Security Investigation and Response/10. Linux Forensics/10_02 - Checking out Linux log files.mp4 8.9 MB
Learning Lynda - Computer Security Investigation and Response/10. Linux Forensics/10_03 - Finding Linux directories.mp4 5.5 MB
Learning Lynda - Computer Security Investigation and Response/10. Linux Forensics/10_04 - Recovering a deleted file in Linux.mp4 9.6 MB
Learning Lynda - Computer Security Investigation and Response/11. Forensic Tools/11_01 - Checking out open-source forensic tools.mp4 5.6 MB
Learning Lynda - Computer Security Investigation and Response/11. Forensic Tools/11_02 - Checking out commercial forensic software.mp4 6.4 MB
Learning Lynda - Computer Security Investigation and Response/11. Forensic Tools/12_01 - Next steps and resources.mp4 1.5 MB
Learning Lynda - Computer Security Investigation and Response/Torrent Downloaded From Katcr.co - Kickasstorrents.txt 52 B
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce

Loading...