Computer security: Research and response

CURS-563

Do you want to learn how to carry out a forensic investigation in computer equipment or in a network? This course will help you achieve it, and you will learn what hardware or software tools you need to achieve your goal.

Do you want to learn how to carry out a forensic investigation in computer equipment or in a network? This course will help you achieve it, and you will learn what hardware or software tools you need to achieve your goal.


This course will teach you how to carry out an investigation applying the basic fundamentals of computer security, such as the collection or acquisition of digital evidence in computer equipment or in a network. You will know some of the most important tools with which you can perform research and that your forensic laboratory should have both hardware and software. Before starting this course you will define very important points and that you must have very clear as they are: What is computer forensics, which are cybercrimes, how to establish a forensic laboratory and more ...


I leave here the full content of the course:

COURSE CONTENT

The forensic sciences

    What is computer forensics 03:18
    Identification of digital evidences 05:16
    Destruction of digital evidence 06:29
    Good practices in computer forensics 04:44
    Standards of forensic investigation 02:49
    Scientific and legal validity of the evidences 01:39

Describe cybercrimes

    What are cyber crimes? 04:05
    Impersonation 04:01
    Bases of cyberbullying 05:04
    Hacking and unauthorized access 02:54
    Cybercrime without access 05:06

Establish a forensic laboratory

    Become a computer expert 03:45
    Work with digital evidences 03:35
    Equip an expert's lab 02:52
    Legal considerations on expertise 03:21
    Forensic Software 04:22

Respond to a cyber-incident

    Detect incidents 04:16
    Teams on vs. computers turned off 02:17
    Safeguarding evidence 02:35
    Disaster recovery by incident or cybercrime 02:15
    Report or report cyber incidents 04:51

Evidence collection

    Evidence collection protocol 03:01
    Evidence storage 03:25
    Forensic copies 04:39
    Methods of concealment of information 07:16
    Recover deleted information 04:20
    Work with damaged brackets 03:12
    Recover data from web browsers 03:47
    Recover evidence of Smartphones 04:27

Evidence based on network

    Firewall logs 04:00
    Detect intrusions in the network 04:56
    Evidences in the routers 03:14

Forensic investigation in Windows

    Windows and forensic analysis 04:14
    Windows Event Log 04:35
    Special Windows Directories 04:50
    The Windows Registry 04:05

Forensic tools



    Free forensic software 02:32
    Commercial forensic software 02:03
   

See catches




Totally virus free and malicious software, so don't wait any longer on Descargartelo now.

Don't forget to give us an opinion about the course, to improve the content.

Download area


 

Want to see our free course gallery available?


To see our gallery of courses click here   Free Courses Gallery

Follow us on our social networks


Note: Do not forget to follow us on our social networks of Facebook and Twitter to form part of our community and receive the notification every time we publish something new, so you will not miss anything.

License Freeware
Language Only Spanish
File Size 473 MB
Developer Curso
Grade 
08/29/2018

Excelente

Gran curso

Write your review!

Write a review

Computer security: Research and response

Computer security: Research and response

Do you want to learn how to carry out a forensic investigation in computer equipment or in a network? This course will help you achieve it, and you will learn what hardware or software tools you need to achieve your goal.

Ask a question

NO registration required!

2 Question(s) answered

If the question you have has not yet been answered here, use the form below to ask something about this addon.

(optional)
*(Required to be notified when an answer is available)
  • Asked by Adriano
    on 08/29/2018
    Hola, Gracias por el material, este curso muestra como recuperar informacion que es borrada del disco duro? Answer:
    Claro, Adriano. Mientras no hayas utilizado demasiado el disco es posible recuperar. Recuerda que cuando borramos, solo se marca para borrar. La información queda allí hasta que un archivo nuevo es copiado.
  • Asked by María
    on 08/30/2018
    Quiero descargar el curso de investigación, seguridad informática Answer:
    Abajo parece el enlace de descarga Maria.

If the download link redirects to another product that is not described in the article or is broken, report it using our Reporting Form

RelatedProducts