->
Lynda - Learning Computer Security Investigation and Response - 419360
Lynda - Learning Computer Security Investigation and Response
Cybersecurity is a growing area of IT. Qualified computer forensics techs are in demand. But even if you aren't a forensics specialist, it can be useful to know how to collect evidence of harassment, hacking, and identity theft on your own computer or mobile phone.


Table of Contents

  • Introduction
  • 1. Understanding Forensic Science
  • 2. Defining Cyber Crime
  • 3. Setting Up a Forensic Lab
  • 4. Responding to a Cyber Incident
  • 5. Collecting Evidence
  • 6. Recovering Evidence
  • 7. Network-Based Evidence
  • 8. Windows Forensics
  • 9. Macintosh Forensics
  • 10. Linux Forensics
  • 11. Forensic Tools
  • Conclusion
  • Lynda - Learning Computer Security Investigation and Response


     TO MAC USERS: If RAR password doesn't work, use this archive program: 

    RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


     TO WIN USERS: If RAR password doesn't work, use this archive program: 

    Latest Winrar  and extract password protected files without error.


     Coktum   |  

    Information
    Members of Guests cannot leave comments.




    rss