» » Computer Security- Investigation and Response

Information of news
19-12-2015, 10:42

Computer Security- Investigation and Response

Category: Tutorials

Computer Security- Investigation and Response
Lynda - Computer Security: Investigation and Response
Size: 276MB | Duration: 1h 57m | Video: AVC (.mp4) 1280x720 15&30fps | Audio: AAC 48KHz 2ch
Genre: eLearning | Level: Advanced | Language: English

Cybersecurity is a growing area of IT. Qualified computer forensics techs are in demand. But even if you aren't a forensics specialist, it can be useful to know how to collect evidence of harassment, hacking, and identity theft on your own computer or mobile phone. This course covers the basics of computer forensics and cyber crime investigation. Author Sandra Toner provides an overview of forensic science, and discusses best practices in the field and the frameworks professionals use to conduct investigations. Then, after showing how to set up a simple lab, Sandra describes how to respond to a cyber incident without disturbing the crime scene. She dives deep into evidence collection and recovery, explaining the differences between collecting evidence from Windows, Mac, and Linux machines. The course wraps up with a look at some of the more commonly used computer forensics software tools.
Topics include:* Applying science to digital investigations
* Understanding forensic frameworks
* Defining cyber crime: harassment, hacking, and identity theft
* Setting up a forensic lab
* Responding to cyber incidents
* Collecting and recovering evidence
* Examining networks for evidence
* Applying forensics to Windows, Mac, and Linux
* Working with forensics tools



Site BBcode/HTML Code:
Dear visitor, you went to the site as unregistered user.
We recommend you Sign up or Login to website under your name.
Would you like to leave your comment? Please Login to your account to leave comments. Don't have an account? You can create a free account now.

Tag Cloud

archive of news

free html hit counter