Digital Forensics for Cyber Professionals جرم یابی دیجیتال برای حرفه ای های سایبر

در دنیای مدرن امروزی همراه با پیشرفت روزانه تکنولوژی، وقوع جرم و جنایت نیز در این حوزه رو به افزایش است. لذا شناسایی و جمع‌آوری دلایل کافی جهت اثبات وقوع جرم و تشخیص اینکه این جرم توسط چه کسی و به واسطه چه ابزاری و چگونه اتفاق افتاده است، امری ضروری و دشوار می‌باشد. جرم یابی دیجیتال (Digital Forensics) با جستجو، حفظ و آنالیز اطلاعات موجود بر روی سیستم‌های رایانه‌ای به دنبال جمع‌آوری شواهد و مدارکی است که مجرم و شرایط وقوع جرم را بررسی کرده و مدارک معتبر جهت ارائه به دادگاه و مراجع قانونی را کشف می‌نماید…

لینک دانلود

 Digital Forensics for Cyber Professionals

حجم: 1.20 گیگابایت

دانلود
رمز فایل: technet24.ir

Digital Forensics for Cyber Professionals

Video Details
ISBN 139781788621465
Course Length1 hour and 51 minutes

Video Description
In this course you will learn how to use open source tools to collect digital forensic information from Linux and Windows systems. You will learn how to conduct static malware analysis of live ‘Ransomware’ using forensics tools and techniques.This course focuses on screencast demonstrations of how to use these tools in a step-by-step manner so you can start doing forensics work immediately on your own. Digital Forensics OverviewRecovery and ReconstructionReversing and Malware AnalysisWindows and Linux Live ResponseIncident Response TechniquesRed and Blue Team Tools Conduct Forensic Analysis of Hacker ActivitiesCAINEForensics Tools and StorageLearn to use open source tools such as CAINE to do forensic analysis on live systems. The Cyber Forensics field is red hot. Stake your claim now!

Style and Approach
This course focuses on screencast demonstrations of how to use these tools in a step-by-step manner so you can start doing forensics work immediately on your own.
Table of Contents
The Digital Forensics Field
Recovery and Reconstruction
Reversing and Malware Analysis
Forensics Tools and Storage
Course Summary

What You Will Learn
Learn how to use open source tools to collect digital forensic information from Linux and Windows systems. This course focuses on screencast demonstrations of how to use these tools in a step-by-step manner so you can start doing forensics work immediately on your own.

Authors
Chad Russell

Chad Russell – Hello, I’m Chad Russell. I’ve been in the CyberSecurity industry for over 15 years. I’ve taught Microsoft Engineering courses as a Certified trainer, I’ve managed teams of security engineers and analysts for an internet banking provider, I’ve been an information security consultant working for companies including SAP, Microsoft and Oracle. I lead and conduct ‘Security Risk Assessments’ for customers throughout North America with an emphasis on cloud security, identity governance, network security, social engineering, mobile security, breach assessments, database security and access management. Over the past 15 years I’ve held numerous certifications including CISSP, CCNP, MCSE and MCDBA certifications and have a B.S. in Computer Science from Excelsior College I can help you get certified and get ahead!

دیدگاه 1
  1. drsam23 says

    ممنون مطالبتون عالیه من هر روز به سایتتون سر میزنم و از مطالب عالی لذت میبرم

دیدگاه

آدرس ایمیل شما منتشر نخواهد شد.