Digital Forensics and Cyber Crime with Kali Linux Fundamentals LiveLessons [FCO]
- CategoryOther
- TypeTutorials
- LanguageEnglish
- Total size24.6 GB
- Uploaded BySunRiseZone
- Downloads306
- Last checkedFeb. 11th '19
- Date uploadedFeb. 10th '19
- Seeders 21
- Leechers72
Created by : Joseph Muniz, Aamir Lakhani
Published : Sep 21, 2017 by Cisco Press. Part of the LiveLesson Series.
Language : English
ISBN-10 : 0-13-469363-9
ISBN-13 : 978-0-13-469363-7
Torrent Contains : 98 Files
Course Source : http://www.ciscopress.com/store/digital-forensics-and-cyber-crime-with-kali-linux-fundamentals-9780134693637
More Than 13 Hours of Expert Video Instruction
Description
Why is digital forensics so important? In today’s digital world, every organization is bound to be attacked and likely breached by a cyber adversary. Forensics can be used to determine if and how a breach occurred and also how to properly respond.
Digital Forensics and Cyber Crime with Kali Linux Fundamentals LiveLessons introduces you to the world of digital forensics and acts as a primer for your future forensic work. This is the course that will teach you the core concepts you need and also get you up and running with your own digital forensics career. Learn when a breach occurs, what actions you can take, and then how to learn from the breach to prevent future attacks. This video course also focuses on using open source technology available in the Kali Linux framework along with other tools to simplify forensic tasks. You will master the basics of digital forensics, learn best practices, and explore legal and forensic service concepts. This course is a must for anyone interested in starting their Digital Forensics career today.
Skill Level
• All levels
Learn How To
• Plan, organize, build, and deploy end-to-end IoT solutions
• Navigate today’s IoT product marketplace
• Use maturing IoT technologies to solve many business and technical problems
• Make sense of the full IoT protocol stack, from 802.15.4 and LPWA to IPv6 adaptations and management
• Architect IoT networks for maximum security and integrity
• Generate meaningful intelligence from the data your smart objects capture
• Compare and use batch-level and real-time streaming analytics
• Improve IoT system efficiency through fog and edge computing
• Leverage key IoT applications for utilities, transportation, manufacturing, smart cities, public safety, oil/gas production, and mining
Who Should Take This Course
Any network or security professional who is concerned about being breached by a cyber threat. This includes people looking to develop an incident response plan, anyone with an interest in digital forensics, network engineers looking to beef up their security knowledge, and people involved with cyber security work.
Course Requirements
Requires basic knowledge of Internet and networking technology.
Table of Contents
Lesson 1: Introduction to Digital Forensics
Lesson 2: Digital Forensic Investigations
Lesson 3: Getting Started with a Forensic Linux Workstation
Lesson 4: Data Duplication and Data Protection
Lesson 5: Collecting and Preserving Evidence
Lesson 6: Cracking Passwords
Lesson 7: Windows Forensics
Lesson 8: Network Forensics
Lesson 9: Email Forensics
Lesson 10: Reverse Malware Engineering
Lesson 11: Forensic Case Studies
About Pearson Video Training
Pearson’s expert-led video tutorials teach you the technology skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que. Topics include: IT certification, programming, web and mobile development, networking, security, and more. Learn more about Pearson Video training at http://www.informit.com/video.
For More Udemy Free Courses >>> http://www.freetutorials.eu
For more Lynda and other Courses >>> https://www.freecoursesonline.me/
Our Forum for discussion >>> https://discuss.freetutorials.eu/
Files:
[FreeCoursesOnline.Me] Digital Forensics and Cyber Crime with Kali Linux Fundamentals LiveLessons [FCO]- 00001 Digital_Forensics_and_Cyber_Crime_with_Kali_Linux_Fundamentals_-_Introduction.mp4 (138.0 MB)
- 00002 Learning_objectives.mp4 (39.2 MB)
- 00003 Why_forensics.mp4 (923.9 MB)
- 00004 Cyber_crime.mp4 (1,003.9 MB)
- 00005 Introduction_to_digital_forensics.mp4 (417.2 MB)
- 00006 Summary.mp4 (34.9 MB)
- 00007 Learning_Objectives.mp4 (62.4 MB)
- 00008 2.1_Overview_of_digital_forensics.mp4 (454.9 MB)
- 00009 2.2_Outsourcing_vs._providing_in-house_forensic_services.mp4 (320.4 MB)
- 00010 2.3_Search_and_seizure_overview.mp4 (453.6 MB)
- 00011 2.4_Basic_forensics_lab.mp4 (139.5 MB)
- 00012 2.5_Forensic_tool_overview.mp4 (177.9 MB)
- 00013 2.6_Collecting_evidence.mp4 (192.4 MB)
- 00014 2.7_Steganography_and_images.mp4 (281.9 MB)
- 00015 2.8_Preserving_and_reviewing_digital_evidence.mp4 (88.9 MB)
- 00016 2.9_Packaging_evidence.mp4 (20.9 MB)
- 00017 2.10_Forensic_reports.mp4 (105.5 MB)
- 00018 Summary.mp4 (33.4 MB)
- 00019 Learning_objectives.mp4 (27.9 MB)
- 00020 3.1_Downloading_Kali_Linux.mp4 (153.3 MB)
- 00021 3.2_Creating_and_running_Kali_Linux.mp4 (150.6 MB)
- 00022 3.3_Running_Kali_Linux_Virtual_Machine.mp4 (105.4 MB)
- 00023 3.4_Updating_and_installing_Forensic_Packages.mp4 (143.8 MB)
- 00024 3.5_Kali_Linux_as_a_Forensic_Workstation.mp4 (254.3 MB)
- 00025 Summary.mp4 (17.6 MB)
- 00026 Learning_objectives.mp4 (34.0 MB)
- 00027 4.1_Pre_duplication.mp4 (416.7 MB)
- 00028 4.2_Forensic_Images.mp4 (1.2 GB)
- 00029 4.3_Image_Types.mp4 (550.6 MB)
- 00030 4.4_RAID.mp4 (185.9 MB)
- 00031 4.5_Kali_Disk_Duplication.mp4 (450.9 MB)
- 00032 4.6_Windows_Disk_Duplication.mp4 (135.0 MB)
- 00033 Summary.mp4 (156.9 MB)
- 00034 Learning_objectives.mp4 (41.1 MB)
- 00035 5.1_Introduction_to_Collecting_and_Preserving.mp4 (285.6 MB)
- 00036 5.2_Hashing.mp4 (592.4 MB)
- 00037 5.3_Preserving_Data.mp4 (527.5 MB)
- 00038 5.4_Linux_Tools.mp4 (328.8 MB)
- 00039 Summary.mp4 (58.6 MB)
- 00040 Learning_objectives.mp4 (18.5 MB)
- 00041 6.1_Password_cracking_concepts.mp4 (124.0 MB)
- 00042 6.2_Password_cracking_tools.mp4 (400.3 MB)
- 00043 6.3_Windows_passwords.mp4 (21.9 MB)
- 00044 6.4_Linux_OSX_passwords.mp4 (67.0 MB)
- 00045 Summary.mp4 (10.3 MB)
- 00046 Learning_objectives.mp4 (23.2 MB)
- 00047 7.1_File_system_overview.mp4 (78.2 MB)
- 00048 7.2_Shortcut_files.mp4 (23.7 MB)
- 00049 7.3_Recycle_bin.mp4 (23.2 MB)
- 00050 7.4_Info_and_spool_files.mp4 (19.8 MB)
- 00051 7.5_Registry_Part_1.mp4 (55.1 MB)
- 00052 7.6_Registry_Part_2.mp4 (38.3 MB)
- 00053 7.7_Registry_by_OS.mp4 (19.0 MB)
- 00054 7.8_Registry_Part_3.mp4 (17.4 MB)
- 00055 7.9_Registry_Forensics.mp4 (53.6 MB)
- 00056 7.10_Registry_investigations.mp4 (32.9 MB)
- 00057 7.11_FTK_registry_viewer.mp4 (50.8 MB)
- 00058 Summary.mp4 (9.0 MB)
- 00059 Learning_objectives.mp4 (51.0 MB)
- 00060 8.1_Networks.mp4 (625.3 MB)
- 00061 8.2_Security_Tools.mp4 (353.7 MB)
- 00062 8.3_Firewalls.mp4 (561.4 MB)
- 00063 8.4_Content_Filtering.mp4 (819.9 MB)
- 00064 8.5_Breach_and_Honeypots.mp4 (599.6 MB)
- 00065 8.6_Network_Access_Control.mp4 (548.1 MB)
- 00066 8.7_Netflow.mp4 (566.0 MB)
- 00067 8.8_Data_Loss_Prevention.mp4 (129.5 MB)
- 00068 8.9_Network_Attacks.mp4 (1.4 GB)
- 00069 8.10_Detecting_Threats.mp4 (710.8 MB)
- 00070 8.11_Snort_Part_1.mp4 (1.5 GB)
- 00071 8.12_Snort_Part_2.mp4 (1.4 GB)
- 00072 8.13_Network_Logs.mp4 (1.3 GB)
- 00073 Summary.mp4 (233.9 MB)
- 00074 Learning_objectives.mp4 (16.3 MB)
- 00075 9.1_Email_system_and_clients.mp4 (42.6 MB)
- 00076 9.2_Investigating_email.mp4 (220.3 MB)
- 00077 9.3_Email_forensic_tools.mp4 (273.5 MB)
- 00078 Summary.mp4 (22.1 MB)
- 00079 Learning_objectives.mp4 (24.7 MB)
- 00080 10.1_Introduction_to_malware_analysis.mp4 (105.6 MB)
- 00081 10.2_Static_analysis.mp4 (168.4 MB)
- 00082 10.3_Static_analysis_tools.mp4 (89.6 MB)
- 00083 10.4_Static_analysis_PDF.mp4 (26.8 MB)
- 00084 10.5_Dynamic_analysis.mp4 (187.8 MB)
- 00085 Summary.mp4 (5.4 MB)
- 00086 Learning_objectives.mp4 (54.1 MB)
- 00087 11.1_Investigating_a_laptop_for_HR.mp4 (326.3 MB)
- 00088 11.2_Investigating_a_network_breach.mp4 (217.7 MB)
- 00089 11.3_Investigating_a_hard_drive_from_eBay.mp4 (135.6 MB)
- 00090 11.4_Complete_legal_example.mp4 (321.3 MB)
- 00091 Summary.mp4 (172.1 MB)
- 00092 Digital_Forensics_and_Cyber_Crime_with_Kali_Linux_Fundamentals_-_Summary.mp4 (36.4 MB)
- Discuss.FreeTutorials.Us.html (165.7 KB)
- FreeCoursesOnline.Me.html (108.3 KB)
- FreeTutorials.Eu.html (102.2 KB)
- How you can help Team-FTU.txt (0.3 KB)
- [TGx]Downloaded from torrentgalaxy.org.txt (0.5 KB)
- Torrent Downloaded From GloDls.to.txt (0.1 KB)
Code:
- https://tracker.fastdownload.xyz:443/announce
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.tiny-vps.com:6969/announce
- udp://tracker.pirateparty.gr:6969/announce
- udp://open.stealth.si:80/announce
- udp://hk1.opentracker.ga:6969/announce
- udp://tracker.cyberia.is:6969/announce
- https://opentracker.xyz:443/announce
- https://t.quic.ws:443/announce
- udp://9.rarbg.to:2710/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://tracker.coppersurfer.tk:6969/announce
- udp://bt.xxx-tracker.com:2710/announce
- udp://open.demonii.si:1337/announce