Lynda - Learning Computer Forensics/00. Introduction/00_01 - Welcome.mp4 |
4.5 MB |
Lynda - Learning Computer Forensics/00. Introduction/00_02 - Using the exercise files.mp4 |
1.5 MB |
Lynda - Learning Computer Forensics/01. Understanding Computer Forensics/01_01 - Goals of computer forensics.mp4 |
3.6 MB |
Lynda - Learning Computer Forensics/01. Understanding Computer Forensics/01_02 - Types of computer forensics investigations.mp4 |
4.5 MB |
Lynda - Learning Computer Forensics/01. Understanding Computer Forensics/01_03 - Computer forensics tools.mp4 |
6.4 MB |
Lynda - Learning Computer Forensics/01. Understanding Computer Forensics/01_04 - Legal implications.mp4 |
5.8 MB |
Lynda - Learning Computer Forensics/02. Preparing for a Computer Forensics Investigation/02_01 - Computer forensics hardware.mp4 |
6.5 MB |
Lynda - Learning Computer Forensics/02. Preparing for a Computer Forensics Investigation/02_02 - Computer forensics software.mp4 |
3.5 MB |
Lynda - Learning Computer Forensics/02. Preparing for a Computer Forensics Investigation/02_03 - Computer forensics certifications.mp4 |
6.9 MB |
Lynda - Learning Computer Forensics/02. Preparing for a Computer Forensics Investigation/02_04 - Understanding partitioning.mp4 |
6 MB |
Lynda - Learning Computer Forensics/02. Preparing for a Computer Forensics Investigation/02_05 - Understanding hexadecimal numbers.mp4 |
10.5 MB |
Lynda - Learning Computer Forensics/02. Preparing for a Computer Forensics Investigation/02_06 - Using a hex editor.mp4 |
8.4 MB |
Lynda - Learning Computer Forensics/02. Preparing for a Computer Forensics Investigation/02_07 - Understanding an offset.mp4 |
5.2 MB |
Lynda - Learning Computer Forensics/03. Preserving Data/03_01 - Understanding the role of write blockers in preserving data integrity.mp4 |
5.5 MB |
Lynda - Learning Computer Forensics/03. Preserving Data/03_02 - Using a software write blocker.mp4 |
12.2 MB |
Lynda - Learning Computer Forensics/03. Preserving Data/03_03 - Using a hardware write blocker.mp4 |
14.1 MB |
Lynda - Learning Computer Forensics/03. Preserving Data/03_04 - Understanding hashing and its role in ensuring data integrity.mp4 |
8.7 MB |
Lynda - Learning Computer Forensics/03. Preserving Data/03_05 - Hashing algorithms.mp4 |
4.2 MB |
Lynda - Learning Computer Forensics/03. Preserving Data/03_06 - Understanding mounting.mp4 |
9.6 MB |
Lynda - Learning Computer Forensics/03. Preserving Data/03_07 - Mounting manually.mp4 |
10.4 MB |
Lynda - Learning Computer Forensics/03. Preserving Data/03_08 - Hashing in computer forensics tools.mp4 |
7.4 MB |
Lynda - Learning Computer Forensics/04. Acquiring Data/04_01 - Static acquisition.mp4 |
1.1 MB |
Lynda - Learning Computer Forensics/04. Acquiring Data/04_02 - Static acquisition with an open-source tool.mp4 |
11.2 MB |
Lynda - Learning Computer Forensics/04. Acquiring Data/04_03 - Creating split-disk image files with DD.mp4 |
8.5 MB |
Lynda - Learning Computer Forensics/04. Acquiring Data/04_04 - Static acquisition with dcfldd (forensic DD).mp4 |
7.9 MB |
Lynda - Learning Computer Forensics/04. Acquiring Data/04_05 - Static acquisition with a commercial tool.mp4 |
7.4 MB |
Lynda - Learning Computer Forensics/04. Acquiring Data/04_06 - Live acquisition.mp4 |
1.3 MB |
Lynda - Learning Computer Forensics/04. Acquiring Data/04_07 - Live acquisition with FTK Imager.mp4 |
7.4 MB |
Lynda - Learning Computer Forensics/04. Acquiring Data/04_08 - Memory dump analysis with Volatility.mp4 |
10.2 MB |
Lynda - Learning Computer Forensics/04. Acquiring Data/04_09 - Remote acquisition.mp4 |
2.9 MB |
Lynda - Learning Computer Forensics/04. Acquiring Data/04_10 - Remote acquisition with a commercial tool.mp4 |
10 MB |
Lynda - Learning Computer Forensics/05. Analyzing Data/05_01 - Indexing.mp4 |
4.4 MB |
Lynda - Learning Computer Forensics/05. Analyzing Data/05_02 - Searching.mp4 |
8.9 MB |
Lynda - Learning Computer Forensics/05. Analyzing Data/05_03 - Generating a report.mp4 |
8.6 MB |
Lynda - Learning Computer Forensics/05. Analyzing Data/05_04 - Understanding file systems.mp4 |
9.6 MB |
Lynda - Learning Computer Forensics/05. Analyzing Data/05_05 - Understanding the boot sequence.mp4 |
10.7 MB |
Lynda - Learning Computer Forensics/05. Analyzing Data/05_06 - Understanding disk drives.mp4 |
6.3 MB |
Lynda - Learning Computer Forensics/05. Analyzing Data/05_07 - Understanding the master boot record (MBR).mp4 |
11.6 MB |
Lynda - Learning Computer Forensics/05. Analyzing Data/05_08 - Hex editor analysis of a file with a wrong extension.mp4 |
10.4 MB |
Lynda - Learning Computer Forensics/05. Analyzing Data/05_09 - Hex editor analysis of a bit-shifted file.mp4 |
6.1 MB |
Lynda - Learning Computer Forensics/05. Analyzing Data/06_01 - Next steps.mp4 |
3.4 MB |
Lynda - Learning Computer Forensics/Ex_Files_Comp_Forensics_EssT.zip |
192.1 MB |
Lynda - Learning Computer Forensics/Torrent Downloaded From Katcr.co - Kickasstorrents.txt |
52 B |