Learning Computer Forensics With Infinite Skills

  • CategoryOther
  • TypeTutorials
  • LanguageEnglish
  • Total size1.4 GB
  • Uploaded Bytutsnode
  • Downloads361
  • Last checkedAug. 16th '22
  • Date uploadedAug. 15th '22
  • Seeders 107
  • Leechers33

Infohash : B5802E228D791E23DDD70B8AE4E740E14F9971AA


Description

This video based Computer Forensics training course from Infinite Skills will teach you how to get started in this industry. Computer Forensics is a broad topic that touches on many different skills, all specific to answering legal or investigative questions in relation to a computer. This course will give you an overview of the skills you will need in order to work in this highly technical field.


Because Computer Forensics is a broad field, this course covers a lot of topics, from preparing for an investigation, to ethics, to evidence acquisition, being an expert witness and legal vs. corporate investigations. You will learn about forensic tools and how they are used, such as ProDiscover, FTK, and EnCase. This video tutorial covers wireless network investigations, malware and collecting network evidence. You will also learn about UNIX, Windows, Linux and Mac OS, in order to understand where to look for and recover evidence from.

By the conclusion of this computer based tutorial for Computer Forensics, you will have a clear understanding of what it takes to be a computer forensics investigator, and the tools and techniques available to you to find the evidence you will be looking for.
Who this course is for:

Beginners

Requirements

PC or Mac

Last Updated 6/2014

Files:

Learning Computer Forensics With Infinite Skills [TutsNode.net] - Learning Computer Forensics With Infinite Skills 8 - Data Recovery
  • 67 - 0801 Graphics Files.mp4 (49.2 MB)
  • 70 - 0804 Metadata English.vtt (11.1 KB)
  • 69 - 0803 Internet Cache Cookies Etc English.vtt (10.3 KB)
  • 67 - 0801 Graphics Files English.vtt (10.0 KB)
  • 68 - 0802 E English.vtt (7.9 KB)
  • 75 - 0809 Steganalysis English.vtt (7.2 KB)
  • 71 - 0805 Log Files English.vtt (6.5 KB)
  • 76 - 0810 Compression English.vtt (5.8 KB)
  • 74 - 0808 Steganography Techniques Audio And Documents English.vtt (5.5 KB)
  • 73 - 0807 Steganography Techniques Images And Video English.vtt (5.3 KB)
  • 72 - 0806 Steganography English.vtt (3.9 KB)
  • 68 - 0802 EMail.mp4 (24.3 MB)
  • 75 - 0809 Steganalysis.mp4 (22.9 MB)
  • 70 - 0804 Metadata.mp4 (20.6 MB)
  • 71 - 0805 Log Files.mp4 (19.5 MB)
  • 69 - 0803 Internet Cache Cookies Etc.mp4 (19.5 MB)
  • 74 - 0808 Steganography Techniques Audio And Documents.mp4 (14.9 MB)
  • 76 - 0810 Compression.mp4 (11.9 MB)
  • 73 - 0807 Steganography Techniques Images And Video.mp4 (11.7 MB)
  • 72 - 0806 Steganography.mp4 (4.1 MB)
9 - Virtual Machines
  • 77 - 0901 Virtual Machines English.vtt (12.5 KB)
  • 79 - 0903 Data Formats English.vtt (6.1 KB)
  • 78 - 0902 Checkpoints English.vtt (5.4 KB)
  • 80 - 0904 Hypervisors English.vtt (4.8 KB)
  • 77 - 0901 Virtual Machines.mp4 (24.7 MB)
  • 79 - 0903 Data Formats.mp4 (15.7 MB)
  • 80 - 0904 Hypervisors.mp4 (11.6 MB)
  • 78 - 0902 Checkpoints.mp4 (8.4 MB)
6 - Network Acquisitions
  • 56 - 0610 Wireless Tools English.vtt (11.5 KB)
  • 57 - 0611 Firewalls And Their Uses English.vtt (10.0 KB)
  • 52 - 0606 Capturing Traffic English.vtt (9.3 KB)
  • 54 - 0608 Other Network Tools English.vtt (8.9 KB)
  • 47 - 0601 OSI Reference Model English.vtt (8.3 KB)
  • 48 - 0602 TCPIP English.vtt (8.3 KB)
  • 50 - 0604 Reasons For Network Acquisitions English.vtt (8.2 KB)
  • 49 - 0603 Network Attacks English.vtt (8.0 KB)
  • 55 - 0609 Wireless Networking English.vtt (7.9 KB)
  • 51 - 0605 Man In The Middle Attacks English.vtt (7.7 KB)
  • 58 - 0612 Intrusion Detection Systems English.vtt (7.1 KB)
  • 53 - 0607 NetworkMiner English.vtt (6.5 KB)
  • 56 - 0610 Wireless Tools.mp4 (34.5 MB)
  • 52 - 0606 Capturing Traffic.mp4 (29.4 MB)
  • 54 - 0608 Other Network Tools.mp4 (22.3 MB)
  • 57 - 0611 Firewalls And Their Uses.mp4 (21.1 MB)
  • 48 - 0602 TCPIP.mp4 (18.6 MB)
  • 51 - 0605 Man In The Middle Attacks.mp4 (17.9 MB)
  • 50 - 0604 Reasons For Network Acquisitions.mp4 (17.4 MB)
  • 49 - 0603 Network Attacks.mp4 (16.4 MB)
  • 58 - 0612 Intrusion Detection Systems.mp4 (16.3 MB)
  • 53 - 0607 NetworkMiner.mp4 (13.8 MB)
  • 47 - 0601 OSI Reference Model.mp4 (8.3 MB)
  • 55 - 0609 Wireless Networking.mp4 (6.1 MB)
5 - Image Acquisition
  • 44 - 0504 Volatile Information English.vtt (11.5 KB)
  • 44 - 0504 Volatile Information.mp4 (37.5 MB)
  • 45 - 0505 Data Recovery English.vtt (6.4 KB)
  • 42 - 0502 Image Acquisitions Under Linux English.vtt (5.9 KB)
  • 46 - 0506 Hard Drives English.vtt (5.9 KB)
  • 43 - 0503 Image Acquisitions Under Windows English.vtt (5.8 KB)
  • 41 - 0501 Image Formats English.vtt (4.0 KB)
  • 46 - 0506 Hard Drives.mp4 (14.8 MB)
  • 45 - 0505 Data Recovery.mp4 (13.4 MB)
  • 42 - 0502 Image Acquisitions Under Linux.mp4 (12.9 MB)
  • 41 - 0501 Image Formats.mp4 (6.9 MB)
  • 43 - 0503 Image Acquisitions Under Windows.mp4 (5.3 MB)
3 - Investigations
  • 24 - 0311 UNIX Tools English.vtt (11.5 KB)
  • 19 - 0306 FTK English.vtt (10.3 KB)
  • 23 - 0310 Reporting English.vtt (9.7 KB)
  • 25 - 0312 Sleuth Kit English.vtt (8.8 KB)
  • 17 - 0304 Forensic Workstation English.vtt (8.6 KB)
  • 21 - 0308 ProDiscover Basic English.vtt (7.5 KB)
  • 22 - 0309 Audit Policies English.vtt (7.2 KB)
  • 26 - 0313 DEFT Linux English.vtt (6.9 KB)
  • 14 - 0301 Differences With Legal Investigations English.vtt (6.7 KB)
  • 15 - 0302 Reasons For Corporate Investigations English.vtt (6.1 KB)
  • 16 - 0303 Preparing For An Investigation English.vtt (5.4 KB)
  • 18 - 0305 EnCase English.vtt (4.7 KB)
  • 20 - 0307 Coroners Toolkit English.vtt (4.1 KB)
  • 19 - 0306 FTK.mp4 (26.8 MB)
  • 23 - 0310 Reporting.mp4 (26.2 MB)
  • 24 - 0311 UNIX Tools.mp4 (24.3 MB)
  • 25 - 0312 Sleuth Kit.mp4 (20.5 MB)
  • 21 - 0308 ProDiscover Basic.mp4 (17.3 MB)
  • 14 - 0301 Differences With Legal Investigations.mp4 (16.2 MB)
  • 20 - 0307 Coroners Toolkit.mp4 (13.7 MB)
  • 15 - 0302 Reasons For Corporate Investigations.mp4 (12.1 MB)
  • 17 - 0304 Forensic Workstation.mp4 (11.3 MB)
  • 26 - 0313 DEFT Linux.mp4 (10.3 MB)
  • 22 - 0309 Audit Policies.mp4 (9.3 MB)
  • 18 - 0305 EnCase.mp4 (5.4 MB)
  • 16 - 0303 Preparing For An Investigation.mp4 (3.7 MB)
7 - Data Spaces
  • 63 - 0705 Registry English.vtt (11.3 KB)
  • 62 - 0704 Slack Space And Swap File English.vtt (9.7 KB)
  • 66 - 0708 Audit Logs And Settings English.vtt (8.8 KB)
  • 64 - 0706 Virtual Memory English.vtt (8.8 KB)
  • 59 - 0701 Alternate Data Streams English.vtt (8.6 KB)
  • 60 - 0702 Deleted Files English.vtt (7.2 KB)
  • 61 - 0703 Hidden Partitions English.vtt (4.2 KB)
  • 65 - 0707 System Recovery Checkpoints Windows English.vtt (3.2 KB)
  • 64 - 0706 Virtual Memory.mp4 (32.8 MB)
  • 62 - 0704 Slack Space And Swap File.mp4 (27.5 MB)
  • 60 - 0702 Deleted Files.mp4 (22.1 MB)
  • 66 - 0708 Audit Logs And Settings.mp4 (16.6 MB)
  • 59 - 0701 Alternate Data Streams.mp4 (15.3 MB)
  • Code:

    • udp://open.stealth.si:80/announce
    • udp://tracker.tiny-vps.com:6969/announce
    • udp://fasttracker.foreverpirates.co:6969/announce
    • udp://tracker.opentrackr.org:1337/announce
    • udp://explodie.org:6969/announce
    • udp://tracker.cyberia.is:6969/announce
    • udp://ipv4.tracker.harry.lu:80/announce
    • udp://tracker.uw0.xyz:6969/announce
    • udp://opentracker.i2p.rocks:6969/announce
    • udp://tracker.birkenwald.de:6969/announce
    • udp://tracker.torrent.eu.org:451/announce
    • udp://tracker.moeking.me:6969/announce
    • udp://tracker.dler.org:6969/announce
    • udp://9.rarbg.me:2970/announce