الرئيسية / courses / English Courses / Cyber Security / تحميل كورس Computer Forensics Essential Training
تحميل كورسComputer Forensics Essential Training

تحميل كورس Computer Forensics Essential Training

تحميل كورس Computer Forensics Essential Training

Computer forensics is used to find legal evidence in computers or storage devices. Although this course won’t teach you how to become a digital forensics detective, it will cover the basics of this growing (and exciting) technical field. Author Jungwoo Ryoo reviews the basics: the goals of computer forensics, the types of investigations it’s used for, a forensic investigator’s typical toolset, and the legal implications of this type of work. Then he’ll show how to prepare for an investigation; acquire data “live” while the system is running, statically from a hard drive, or from a remote machine; make sure data is kept in its original state with software and hardware write blockers; analyze the data; and create a report of your findings. Jungwoo uses a combination of open-source and commercial software, so you’ll be able to uncover the information you need with the tools that are in your budget.

تحميل كورسComputer Forensics Essential Training

تحميل كورس Computer Forensics Essential Training

English|  MP4 | AVC 1280×720 | AAC 48KHz 2ch  | 200 MB
eLearning | Skill level: Beginner

التحميل Donwloadمشاهدة View

التحميل من Google Drive

Download From Here

لو توقفت لينكات التحميل برجاء اخباري لأعيد رفع الكورس مره اخري

If Links are dead . comment and tell me

 

Lecture 001 Welcome

Lecture 002 Using the exercise files

Lecture 003 Goals of computer forensics

Lecture 004 Types of computer forensics investigations

Lecture 005 Computer forensics tools

Lecture 006 Legal implications

Lecture 007 Computer forensics hardware

Lecture 008 Computer forensics software

Lecture 009 Computer forensics certifications

Lecture 010 Understanding partitioning

Lecture 011 Understanding hexadecimal numbers

Lecture 012 Using a hex editor

Lecture 013 Understanding an offset

Lecture 014 Understanding the role of write blockers in preserving data integrity

Lecture 015 Using a software write blocker

Lecture 016 Using a hardware write blocker

Lecture 017 Understanding hashing and its role in ensuring data integrity

Lecture 018 Hashing algorithms

Lecture 019 Understanding mounting

Lecture 020 Mounting manually

Lecture 021 Hashing in computer forensics tools

Lecture 022 Static acquisition

Lecture 023 Static acquisition with an open-source tool

Lecture 024 Creating split-disk image files with DD

Lecture 025 Static acquisition with dcfldd %28forensic DD%29

Lecture 026 Static acquisition with a commercial tool

Lecture 027 Live acquisition

Lecture 028 Live acquisition with FTK Imager

Lecture 029 Memory dump analysis with Volatility

Lecture 030 Remote acquisition

Lecture 031 Remote acquisition with a commercial tool

Lecture 032 Indexing

Lecture 033 Searching

Lecture 034 Generating a report

Lecture 035 Understanding file systems

Lecture 036 Understanding the boot sequence

Lecture 037 Understanding disk drives

Lecture 038 Understanding the master boot record %28MBR%29

Lecture 039 Hex editor analysis of a file with a wrong extension

Lecture 040 Hex editor analysis of a bit-shifted file

Lecture 041 Next steps

عن محمد السيد

دكتور صيدلي مهتم بكل ماهو جديد في عالم الكمبيوتر والانترنت مؤمن بان التعليم لابد ان يكون مجاني وان الانسان لابد وان يتعلم كل يوم شيء جديد وحتي اخر يوم في عمره .

3 تعليقات

  1. لو سمحت يا د/محمد اللينك لايعمل الملف تم حذفة او ازيل

  2. حاضر جاري تغيير اللينكات اخي الكريم

  3. تم تغيير اللينكات اخي

أضف تعليقاً

لن يتم نشر عنوان بريدك الإلكتروني. الحقول الإلزامية مشار إليها بـ *

Show Buttons
Hide Buttons

Watch Dragon ball super