MP4 | Video: AVC 1280x720 | Audio: AAC 48 kHz 2ch | Duration: 1.5 Hours | 242 MB
Genre: eLearning | Language: English
Criminals rely on the intricacies of operating systems like Windows, macOS, and Linux to conceal their activities and hide data. However, a skilled digital forensics expert knows the places to look and the tools to use to access evidence of their crimes. This course covers all the major concepts and tools of the growing field of operating system forensics. Instructor Jungwoo Ryoo (J.R.) reviews the fundamentals: the goals, history, and roles of operating system forensics and the future of the industry. He then shows how to acquire evidence from file systems, slack space, alternate data streams, and main memory. He uses a combination of free and commercial software, so students can practice techniques like file recovery and live acquisition with the tools that are within their budgets.
Topics include:
Core concepts of operating system forensics
Job prospects in operating system forensics
File systems: Windows, Linux, and Mac
Acquiring data from file systems
Recovering files with data carving
Finding data in slack space
Live acquisition
Acquiring data from alternate data streams
[/i]Homepage
[i]Screenshots
https://rapidgator.net/file/853bc17e6353afe93534a86197d5e4a0
nitroflare_com:
http://nitroflare.com/view/0864A8C2C684924/Operating_System_Forensics.rar