• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Courses Pluralsight - Digital Forensics Implementation

dEEpEst

☣☣ In The Depths ☣☣
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Mar 29, 2018
Messages
13,861
Solutions
4
Reputation
27
Reaction score
45,548
Points
1,813
Credits
55,350
‎7 Years of Service‎
 
56%

Content​

Code:
+---Digital Forensics Implementation
    +---1. Setting up a Forensic Workstation
    ª   +---01. Course Overview
    ª   ª       01. Course Overview.mp4
    ª   ª       01. Course Overview.srt
    ª   ª       
    ª   +---02. Using Virtual Machines, Checkpoints, and Sandboxing Applications to Extract Data
    ª   +---03. Gathering Forensic Data For Legal Inquiry
    ª   ª       01. View and Analyze Proxy Server Logs.mp4
    ª   ª       01. View and Analyze Proxy Server Logs.srt
    ª   ª       02. Analyze Cloud Based Storage.mp4
    ª   ª       02. Analyze Cloud Based Storage.srt
    ª   ª       03. Keywork Searches in Email.mp4
    ª   ª       03. Keywork Searches in Email.srt
    ª   ª       04. Social Networking Search.mp4
    ª   ª       04. Social Networking Search.srt
    ª   ª       
    ª   +---04. Installing Forensic Applications
    ª   ª       01. Review of Forensic Toolkit.mp4
    ª   ª       01. Review of Forensic Toolkit.srt
    ª   ª       02. Demonstration of Ftk Imager.mp4
    ª   ª       02. Demonstration of Ftk Imager.srt
    ª   ª       03. Review of Autopsy Offerings.mp4
    ª   ª       03. Review of Autopsy Offerings.srt
    ª   ª       04. Demonstration of Autopsy Installation and Features.mp4
    ª   ª       04. Demonstration of Autopsy Installation and Features.srt
    ª   ª       05. Autopsy Forensic Reports.mp4
    ª   ª       05. Autopsy Forensic Reports.srt
    ª   ª       
    ª   +---05. Understanding Backups and Redundancy
    ª           01. Backup Types in a Modern Network.mp4
    ª           01. Backup Types in a Modern Network.srt
    ª           02. Virtual Machine Replication.mp4
    ª           02. Virtual Machine Replication.srt
    ª           
    +---2. Enumerating the Network Infrastructure as a Forensics Analyst
        +---01. Course Overview
        ª       01. Course Overview.mp4
        ª       01. Course Overview.srt
        ª       
        +---02. Applying Physical Networking Concepts to a Forensic Investigation
        +---03. Defining Key Network Protocols for Supporting an Investigation
        +---04. Securing the Infrastructure
        ª       01. Securing the Infrastructure.mp4
        ª       01. Securing the Infrastructure.srt
        ª       02. Managed Switches.mp4
        ª       02. Managed Switches.srt
        ª       03. Remote Access.mp4
        ª       03. Remote Access.srt
        ª       04. TOR and The Dark Web.mp4
        ª       04. TOR and The Dark Web.srt
        ª       05. Demo- TOR and The Dark Web.mp4
        ª       05. Demo- TOR and The Dark Web.srt
        ª       06. Defense in Depth.mp4
        ª       06. Defense in Depth.srt
        ª       07. Demo- Defense in Depth.mp4
        ª       07. Demo- Defense in Depth.srt
        ª       08. How to Ask the Right Questions.mp4
        ª       08. How to Ask the Right Questions.srt
        ª       
        +---05. Comparing Workgroups and Domains and How They Can Affect an Investigation
        +---06. Understanding Wireless Networks
                01. Understanding Wireless.mp4
                01. Understanding Wireless.srt
                02. Conducting a WIFI Survey.mp4
                02. Conducting a WIFI Survey.srt
                03. Demo- Conducting a WIFI Survey.mp4
                03. Demo- Conducting a WIFI Survey.srt
                04. Course Summary.mp4
                04. Course Summary.srt

Download​

 
Back
Top