zhongziso种子搜
首页
功能
磁力转BT
BT转磁力
使用教程
免责声明
关于
zhongziso
搜索
Lynda - Computer Security_Investigation and Response
magnet:?xt=urn:btih:E7E101DB2819B9AC8199E084821EF1C57D98B90D&dn=Lynda - Computer Security_Investigation and Response
磁力链接详情
Hash值:
E7E101DB2819B9AC8199E084821EF1C57D98B90D
点击数:
72
文件大小:
273.73 MB
文件数量:
48
创建日期:
2015-12-19 16:37
最后访问:
2024-10-24 18:35
访问标签:
Lynda
-
Computer
Security_Investigation
and
Response
文件列表详情
027 Finding hidden data.mp4 12.03 MB
013 Differentiating nonaccess crimes.mp4 10.63 MB
023 Reporting cyber incidents.mp4 9.85 MB
045 Recovering a deleted file in Linux.mp4 9.58 MB
011 Examining cyber harassment.mp4 9.15 MB
043 Checking out Linux log files.mp4 8.97 MB
010 Defining identity theft.mp4 8.9 MB
005 Destroying digital evidence.mp4 8.33 MB
019 Discovering an incident.mp4 7.36 MB
035 Applying forensics to Windows.mp4 7.11 MB
028 Resurrecting data.mp4 7.05 MB
003 Applying science to digital investigations.mp4 6.94 MB
006 Using forensic best practices.mp4 6.84 MB
033 Detecting network intrusion.mp4 6.73 MB
004 Identifying digital evidence.mp4 6.49 MB
047 Checking out commercial forensic software.mp4 6.41 MB
039 Applying forensics to a Mac.mp4 6.22 MB
014 Building a knowledgebase.mp4 6.18 MB
025 Storing evidence.mp4 6.06 MB
029 Working with damaged media.mp4 5.99 MB
024 Following protocol.mp4 5.96 MB
018 Selecting forensic software.mp4 5.87 MB
046 Checking out open-source forensic tools.mp4 5.69 MB
012 Explaining hacking techniques.mp4 5.68 MB
044 Finding Linux directories.mp4 5.57 MB
017 Considering legal implications.mp4 5.36 MB
020 Differentiating between postmortem and live forensics.mp4 5.22 MB
038 Locating evidence from the Windows Registry.mp4 5.16 MB
021 Preserving evidence.mp4 5.04 MB
007 Examining forensic frameworks.mp4 5.02 MB
026 Imaging evidence.mp4 4.86 MB
036 Checking the Windows audit log.mp4 4.84 MB
030 Viewing browser history.mp4 4.58 MB
037 Finding Windows directories.mp4 4.53 MB
040 Checking out Mac logs.mp4 4.52 MB
031 Recovering evidence from a cellular phone.mp4 4.27 MB
009 Classifying cyber crime.mp4 4.27 MB
008 Ensuring scientific relevance.mp4 3.99 MB
034 Examining router evidence.mp4 3.93 MB
001 Welcome.mp4 3.73 MB
041 Finding Mac directories.mp4 3.55 MB
022 Applying forensics to disaster recovery.mp4 3.29 MB
015 Working with evidence.mp4 3.18 MB
016 Equipping the lab.mp4 3.01 MB
032 Checking out firewall logs.mp4 2.86 MB
048 Next steps and resources.mp4 1.56 MB
042 Applying forensics to Linux.mp4 835.08 KB
002 What you should know before watching this course.mp4 592.68 KB
其他位置