Oreilly - Computer Forensics - 9781771370615
Oreilly - Computer Forensics
by | Released January 2013 | ISBN: 9781771370615


This video based Computer Forensics training course expert Ric Messier will teach you how to get started in this industry. Computer Forensics is a broad topic that touches on many different skills, all specific to answering legal or investigative questions in relation to a computer. Ric will give you an overview of the skills you will need in order to work in this highly technical field.Because Computer Forensics is a broad field, this course covers a lot of topics, from preparing for an investigation, to ethics, to evidence acquisition, being an expert witness and legal vs. corporate investigations. You will learn about forensic tools and how they are used, such as ProDiscover, FTK, and EnCase. This video tutorial covers wireless network investigations, malware and collecting network evidence. You will also learn about UNIX, Windows, Linux and Mac OS, in order to understand where to look for and recover evidence from.By the conclusion of this computer based tutorial for Computer Forensics, you will have a clear understanding of what it takes to be a computer forensics investigator, and the tools and techniques available to you to find the evidence you will be looking for. Show and hide more Publisher resources View/Submit Errata
  1. Introduction
    • What Is Forensics? 00:04:09
    • Professions Needing Forensics 00:07:29
    • What You Should Expect From This Video 00:04:13
    • What You Should Know 00:06:31
    • What You Will Learn 00:04:23
  2. Legal Issues
    • Chain Of Custody 00:05:46
    • Evidence Acquisition 00:07:28
    • Validating Data Under Linux 00:06:57
    • Validating Data Under Windows 00:04:41
    • Expert Witness 00:07:15
    • Ethics For Experts 00:08:14
    • Evidence Storage 00:06:33
    • Rules Of Evidence 00:07:16
  3. Investigations
    • Differences With Legal Investigations 00:06:41
    • Reasons For Corporate Investigations 00:06:10
    • Preparing For An Investigation 00:04:50
    • Forensic Workstation 00:08:42
    • EnCase 00:04:46
    • FTK 00:10:37
    • Coroners Toolkit 00:04:17
    • ProDiscover Basic 00:07:37
    • Audit Policies 00:07:52
    • Reporting 00:10:12
    • UNIX Tools 00:12:36
    • Sleuth Kit 00:09:17
    • DEFT Linux 00:07:09
  4. Operating Systems
    • Windows Family 00:09:08
    • Mac OS X 00:10:32
    • Linux 00:09:14
    • Other Types Of Operating Systems 00:04:50
    • Boot Processes 00:07:37
    • File Systems: Windows-Based 00:09:29
    • File Systems: Linux 00:09:35
    • File Systems: Mac OS 00:07:01
    • File Systems: CD 00:04:45
    • RAID 00:06:34
    • Autostarting 00:07:58
    • Executable Types And Structure: Windows 00:06:50
    • Executable Types And Structure: Unix-Based 00:10:24
    • Disk Partitions 00:07:16
  5. Image Acquisition
    • Image Formats 00:04:11
    • Image Acquisitions Under Linux 00:06:21
    • Image Acquisitions Under Windows 00:05:45
    • Volatile Information 00:11:25
    • Data Recovery 00:06:45
    • Hard Drives 00:05:55
  6. Network Acquisitions
    • OSI Reference Model 00:07:58
    • TCP/IP 00:08:29
    • Network Attacks 00:07:57
    • Reasons For Network Acquisitions 00:07:45
    • Man In The Middle Attacks 00:07:31
    • Capturing Traffic 00:09:09
    • NetworkMiner 00:06:55
    • Other Network Tools 00:08:57
    • Wireless Networking 00:07:41
    • Wireless Tools 00:11:58
    • Firewalls And Their Uses 00:09:48
    • Intrusion Detection Systems 00:06:58
  7. Data Spaces
    • Alternate Data Streams 00:08:29
    • Deleted Files 00:07:21
    • Hidden Partitions 00:04:20
    • Slack Space And Swap File 00:09:50
    • Registry 00:11:47
    • Virtual Memory 00:08:58
    • System Recovery Checkpoints: Windows 00:03:14
    • Audit Logs And Settings 00:09:03
  8. Data Recovery
    • Graphics Files 00:09:26
    • E-Mail 00:08:17
    • Internet: Cache, Cookies, Etc. 00:09:54
    • Metadata 00:10:27
    • Log Files 00:06:43
    • Steganography 00:03:50
    • Steganography Techniques: Images And Video 00:05:33
    • Steganography Techniques: Audio And Documents 00:05:24
    • Steganalysis 00:07:32
    • Compression 00:05:44
  9. Virtual Machines
    • Virtual Machines 00:12:44
    • Checkpoints 00:05:25
    • Data Formats 00:06:34
    • Hypervisors 00:05:04
  10. Mobile Forensics
    • IOS 00:04:56
    • Android 00:07:27
    • Symbian OS 00:03:25
    • Tools 00:07:51
    • Memory Considerations 00:04:08
    • SIM Cards 00:03:25
  11. Malware Forensics
    • Malware Forensics 00:04:34
    • Static Malware Analysis 00:08:41
    • Dynamic Malware Analysis 00:08:38
  12. About Me
    • About Me 00:02:58
  13. Show and hide more

    Oreilly - Computer Forensics


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.


SermonBox - Seasonal Collection

SermonBox - The Series Pack Collection

Top Rated News

  • Christmas Material
  • Laser Cut & Print Design Elements Bundle - ETSY
  • Daz3D - All Materials - SKU 37000-37999
  • Cgaxis - All Product - 2019 - All Retail! - UPDATED!!!
  • DigitalXModels Full Collections
  • Rampant Design Tools Full Collections Total: $4400
  • FilmLooks.Com Full Collection
  • All PixelSquid Product
  • The Pixel Lab Collection
  • Envato Elements Full Sources- 3200+ Files
  • Ui8.NET Full Sources
  • The History of The 20th Century
  • The Dover Collections
  • Snake Interiors Collections
  • Inspirational Collections
  • Veer Fancy Collections
  • All Ojo Images
  • All ZZVE Collections
  • All Sozaijiten Collections
  • All Image Broker Collections
  • Shuterstock Bundle Collections
  • Tattoo Collections
  • Blend Images Collections
  • Authors Tuorism Collections
  • Motion Mile - Big Bundle
  • PhotoBacks - All Product - 2018
  • Dekes Techniques - Photoshop & Illustrator Course - 1 to 673
Telegram GFXTRA Group
Udemy - Turkce Gorsel Ogrenme Setleri - Part 2
Videohive Wow Pack Series


rss