zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
Udemy - IFCI Expert Cybercrime Investigator's Course
magnet:?xt=urn:btih:1cda3e14f1c4380ed55da01661bb943ce823317e&dn=Udemy - IFCI Expert Cybercrime Investigator's Course
磁力链接详情
文件列表详情
1cda3e14f1c4380ed55da01661bb943ce823317e
infohash:
107
文件数量
2.87 GB
文件大小
2017-6-15 07:08
创建日期
2024-10-30 04:09
最后访问
相关分词
Udemy
-
IFCI
Expert
Cybercrime
Investigator's
Course
05 Windows System Forensic Artifacts - Part 1/010 Other Locations of Interest.mp4 5.59 MB
12 Dynamic Malware Analysis/005 IRC Malware Analysis - Part 2.mp4 6.28 MB
09 Network Data Analysis/005 Network Scanners and Sniffers.mp4 6.53 MB
04 Email Internet History Analysis/005 Internet Activity Analysis Introduction.mp4 6.88 MB
03 File Systems, Data Structures, and File Deletion Recovery/005 FAT File Systems.mp4 7.33 MB
03 File Systems, Data Structures, and File Deletion Recovery/004 File System Limitations.mp4 7.52 MB
03 File Systems, Data Structures, and File Deletion Recovery/006 NTFS File Systems.mp4 7.74 MB
07 Module 7 - Windows System Logs Registry Analysis/004 Dr Watson Logs.mp4 8.17 MB
10 Cybercrime, Cyber Terror, Cyber Espionage Investigations/011 Point of Sale Server- Exfiltration.mp4 8.67 MB
12 Dynamic Malware Analysis/002 Virtual Malware Analysis Environment Setup - Part 1.mp4 9.24 MB
10 Cybercrime, Cyber Terror, Cyber Espionage Investigations/004 Supply Chain Interdiction.mp4 9.54 MB
09 Network Data Analysis/002 TCP and UDP Communication Protocols.mp4 10.38 MB
07 Module 7 - Windows System Logs Registry Analysis/007 Registry Analysis -USB Devices.mp4 10.48 MB
09 Network Data Analysis/004 HTTP Analysis and DNS Poisioning.mp4 11.24 MB
12 Dynamic Malware Analysis/003 Virtual Malware Analysis Environment Setup - Part 2.mp4 11.66 MB
09 Network Data Analysis/003 Network Communication and Ports.mp4 11.68 MB
03 File Systems, Data Structures, and File Deletion Recovery/007 File Carving and File Fragmentation.mp4 11.8 MB
07 Module 7 - Windows System Logs Registry Analysis/001 Windows Log Analysis.mp4 12.04 MB
05 Windows System Forensic Artifacts - Part 1/002 Time Zone Issues.mp4 12.22 MB
04 Email Internet History Analysis/007 Internet Explorer Analysis.mp4 12.56 MB
08 Introduction to Malware and Network Intrusions/005 Drive-by Downloads.mp4 13.03 MB
05 Windows System Forensic Artifacts - Part 1/009 Link File Analysis.mp4 13.68 MB
05 Windows System Forensic Artifacts - Part 1/005 MAC Time Triangulation.mp4 13.85 MB
09 Network Data Analysis/001 Network Data Evidence and IP Addressing.mp4 14.01 MB
11 Volatile Memory Analysis/006 Volatility - Advanced Capabilities.mp4 14.15 MB
04 Email Internet History Analysis/002 Host and Web Based Email Extraction.mp4 14.15 MB
07 Module 7 - Windows System Logs Registry Analysis/006 Introduction to the Windows Registry.mp4 14.2 MB
04 Email Internet History Analysis/009 URL Obfuscation.mp4 14.21 MB
08 Introduction to Malware and Network Intrusions/009 Rootkits.mp4 14.3 MB
07 Module 7 - Windows System Logs Registry Analysis/002 System and Application Event Log Analysis.mp4 14.36 MB
06 Windows System Forensic Artifacts Part 2 and File Signature Analysis/002 Prefetch File Analysis.mp4 14.69 MB
04 Email Internet History Analysis/001 Email Analysis.mp4 15.03 MB
06 Windows System Forensic Artifacts Part 2 and File Signature Analysis/001 Thumbs.db and Thumbcache Analysis.mp4 15.17 MB
04 Email Internet History Analysis/006 Chrome and Firefox Analysis.mp4 15.2 MB
03 File Systems, Data Structures, and File Deletion Recovery/001 Introduction to File Systems and Operating Systems.mp4 15.53 MB
05 Windows System Forensic Artifacts - Part 1/003 Time Stamps.mp4 16.15 MB
13 IFCI Course - Wrapup/001 IFCI Course Review.mp4 16.35 MB
07 Module 7 - Windows System Logs Registry Analysis/003 Security Event Log Analysis.mp4 16.44 MB
12 Dynamic Malware Analysis/001 Introduction to Dynamic Malware Analysis.mp4 16.48 MB
10 Cybercrime, Cyber Terror, Cyber Espionage Investigations/001 The Blurred Lines Between Cybercrime, Cyberwar, and Cyberespionage.mp4 16.57 MB
08 Introduction to Malware and Network Intrusions/006 Malware Propagation.mp4 16.58 MB
10 Cybercrime, Cyber Terror, Cyber Espionage Investigations/010 Point of Sale Server- Malware.mp4 16.79 MB
04 Email Internet History Analysis/008 Cookies, Cache, and IE Artifacts.mp4 16.92 MB
07 Module 7 - Windows System Logs Registry Analysis/010 Registry Analysis - Autostarts.mp4 17.02 MB
08 Introduction to Malware and Network Intrusions/004 Botnet Investigations.mp4 17.54 MB
05 Windows System Forensic Artifacts - Part 1/004 Non-Standard Timestamps and Timeline Antiforensics.mp4 17.78 MB
05 Windows System Forensic Artifacts - Part 1/007 Recycle Bin Analysis.mp4 17.92 MB
06 Windows System Forensic Artifacts Part 2 and File Signature Analysis/005 File Signature Analysis.mp4 17.92 MB
05 Windows System Forensic Artifacts - Part 1/006 User Attribution and Analysis.mp4 18.08 MB
12 Dynamic Malware Analysis/004 IRC Malware Analysis - Part 1.mp4 18.12 MB
10 Cybercrime, Cyber Terror, Cyber Espionage Investigations/002 The Intersection of Cybercrime and Cyberwar.mp4 18.65 MB
06 Windows System Forensic Artifacts Part 2 and File Signature Analysis/004 Persistent RAM Files and System Restore Functions.mp4 19.24 MB
08 Introduction to Malware and Network Intrusions/003 Hacker Strategies.mp4 19.34 MB
01 Computer Forensics Core Concepts/005 Sources of Digital Evidence.mp4 19.44 MB
07 Module 7 - Windows System Logs Registry Analysis/009 Registry Analysis - NTUser.dat - Part 2.mp4 19.89 MB
10 Cybercrime, Cyber Terror, Cyber Espionage Investigations/006 Domain and IP Address Investigation Tools.mp4 20.39 MB
10 Cybercrime, Cyber Terror, Cyber Espionage Investigations/005 Criminal Domain Investigations.mp4 20.43 MB
10 Cybercrime, Cyber Terror, Cyber Espionage Investigations/012 Point of Sale Server- Advanced Investigative Techniques.mp4 20.71 MB
11 Volatile Memory Analysis/001 Volatile Memory Analysis Introduction.mp4 20.84 MB
07 Module 7 - Windows System Logs Registry Analysis/008 Registry Analysis - NTUser.dat - Part 1.mp4 21.03 MB
06 Windows System Forensic Artifacts Part 2 and File Signature Analysis/007 Metadata Analysis.mp4 21.12 MB
01 Computer Forensics Core Concepts/006 Home Computer Setup for IFCI Labs.mp4 21.48 MB
01 Computer Forensics Core Concepts/004 Computer Forensic Tools and Testing.mp4 22.24 MB
11 Volatile Memory Analysis/004 Malware Analysis Using Volatility - Part 1.mp4 22.43 MB
03 File Systems, Data Structures, and File Deletion Recovery/003 Slack Space and Deleted Files.mp4 22.63 MB
08 Introduction to Malware and Network Intrusions/007 Polymorphism and Packers.mp4 22.71 MB
02 Forensic Acquisitions Theory Practice/002 Hashes - Digital Fingerprints.mp4 23.7 MB
10 Cybercrime, Cyber Terror, Cyber Espionage Investigations/008 Stuxnet.mp4 23.71 MB
06 Windows System Forensic Artifacts Part 2 and File Signature Analysis/008 Exif Data Analysis.mp4 24.38 MB
08 Introduction to Malware and Network Intrusions/008 Social Engineering.mp4 24.66 MB
02 Forensic Acquisitions Theory Practice/005 Different Approaches to Forensic Acquisition.mp4 24.71 MB
02 Forensic Acquisitions Theory Practice/006 Volatile Memory Acquisition.mp4 24.98 MB
11 Volatile Memory Analysis/005 Malware Analysis Using Volatility - Part 2.mp4 25.13 MB
11 Volatile Memory Analysis/003 Analyzing ZeuS Malware with Volatility.mp4 26.3 MB
10 Cybercrime, Cyber Terror, Cyber Espionage Investigations/009 Point of Sale Server Attacks.mp4 26.76 MB
10 Cybercrime, Cyber Terror, Cyber Espionage Investigations/003 Russian Organized Cybercrime.mp4 27.3 MB
01 Computer Forensics Core Concepts/003 Roles and Responsibilities of the Cybercrime Investigator.mp4 27.33 MB
12 Dynamic Malware Analysis/010 Lab 16-4 Advanced Malware Analysis - Rootkits.mp4 28.1 MB
04 Email Internet History Analysis/003 Email Header Analyisis and Base64 Encoding.mp4 28.11 MB
08 Introduction to Malware and Network Intrusions/001 The Hacking Process.mp4 28.54 MB
02 Forensic Acquisitions Theory Practice/007 Lab2 - Forensic Acquisition Lab.mp4 31.17 MB
01 Computer Forensics Core Concepts/002 Subfields of Computer Forensics.mp4 32.13 MB
02 Forensic Acquisitions Theory Practice/001 Incident Response Triage and Forensic Acquisitons.mp4 32.77 MB
12 Dynamic Malware Analysis/009 Lab 16-3 Advanced Malware Analyis - Rootkits.mp4 32.91 MB
05 Windows System Forensic Artifacts - Part 1/001 Timeline Analysis.mp4 34.12 MB
12 Dynamic Malware Analysis/007 Lab 16-1 Advanced Malware Analysis - Rootkits.mp4 35.65 MB
01 Computer Forensics Core Concepts/001 The World of Cybercrime Investigation.mp4 35.88 MB
02 Forensic Acquisitions Theory Practice/004 Incident Responders Forensic Acquisition Process.mp4 37.35 MB
08 Introduction to Malware and Network Intrusions/002 Hacker Motivations.mp4 37.76 MB
07 Module 7 - Windows System Logs Registry Analysis/005 Lab 11 - Event Log Analysis.mp4 38.05 MB
11 Volatile Memory Analysis/002 Volatility Introduction.mp4 42.8 MB
06 Windows System Forensic Artifacts Part 2 and File Signature Analysis/006 Lab 9 - File Signature Analysis.mp4 46.19 MB
07 Module 7 - Windows System Logs Registry Analysis/011 Lab 12 - Registry Analysis.mp4 47.01 MB
05 Windows System Forensic Artifacts - Part 1/011 Lab 7 - Link File Analysis.mp4 48.73 MB
03 File Systems, Data Structures, and File Deletion Recovery/002 Data Structures.mp4 49.52 MB
05 Windows System Forensic Artifacts - Part 1/008 Lab 6 - Recycle Bin Analysis.mp4 50.26 MB
04 Email Internet History Analysis/010 LAB 5 - Internet Activity Analysis.mp4 61.37 MB
03 File Systems, Data Structures, and File Deletion Recovery/008 Lab 3 Deleted File Recovery.mp4 72.61 MB
11 Volatile Memory Analysis/008 Lab 14_2 Volatile Memory Analysis of SilentBanker Malware.mp4 73 MB
12 Dynamic Malware Analysis/006 Lab 15 - Basic Malware Analysis - IRC Bot.mp4 73.52 MB
06 Windows System Forensic Artifacts Part 2 and File Signature Analysis/003 Lab 8 - Prefetch File Analysis.mp4 76.07 MB
04 Email Internet History Analysis/004 LAB 4 - Email Analysis.mp4 77.66 MB
02 Forensic Acquisitions Theory Practice/003 Lab1 - Hashing.mp4 81.76 MB
06 Windows System Forensic Artifacts Part 2 and File Signature Analysis/009 Lab 10 - Exif Data Analysis.mp4 84.21 MB
10 Cybercrime, Cyber Terror, Cyber Espionage Investigations/007 Lab 13 - Criminal Domain Investigations.mp4 99.35 MB
11 Volatile Memory Analysis/007 Lab 14_1 Volatile Memory Analysis of IRC Malware and VNC Attack.mp4 106.28 MB
12 Dynamic Malware Analysis/008 Lab 16-2 Advanced Malware Analysis - Rootkits.mp4 141.39 MB
其他位置