TorBT - Torrents and Magnet Links Search Engine

[ WebToolTip.com ] Udemy - Mastering Digital Forensics Essentials

File Name
Size
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/1 - Course Introduction/1 - Intro Video to Course.mp4
96 MB
~Get Your Files Here !/1 - Course Introduction/2 - Welcome to the Course Course Overview.html
5.6 kB
~Get Your Files Here !/10 - Timeline Creation and Evidence Correlation/1 - Timeline Creation Using Autopsy.mp4
95 MB
~Get Your Files Here !/10 - Timeline Creation and Evidence Correlation/2 - Correlating Data Across Artifacts and Sources.mp4
56 MB
~Get Your Files Here !/10 - Timeline Creation and Evidence Correlation/3 - Interpreting Anomalies and Suspicious Gaps.mp4
51 MB
~Get Your Files Here !/10 - Timeline Creation and Evidence Correlation/4 - An Abstraction Based Approach for Reconstruction of TimeLine in Digital Forensic.html
536 B
~Get Your Files Here !/10 - Timeline Creation and Evidence Correlation/5 - Timeline Creation and Evidence Correlation _Module 3.pdf.pdf
208 kB
~Get Your Files Here !/10 - Timeline Creation and Evidence Correlation/5 - Using Autopsy for Forensic Analysis.html
237 B
~Get Your Files Here !/11 - Structure and Components of a Forensic Report/1 - Introduction to Section.mp4
19 MB
~Get Your Files Here !/11 - Structure and Components of a Forensic Report/2 - Purpose and Structure of a Forensic Report.mp4
98 MB
~Get Your Files Here !/11 - Structure and Components of a Forensic Report/3 - Required Sections Executive Summary, Methodology, Findings, Conclusions.mp4
76 MB
~Get Your Files Here !/11 - Structure and Components of a Forensic Report/4 - Writing for Non-Technical Audiences.mp4
67 MB
~Get Your Files Here !/11 - Structure and Components of a Forensic Report/5 - Common Mistakes to Avoid (e.g., Bias, Jargon, Vague Language).mp4
50 MB
~Get Your Files Here !/12 - Documenting Evidence and Chain of Custody/1 - Evidence Storage and Management in a Cloud Environment.mp4
63 MB
~Get Your Files Here !/12 - Documenting Evidence and Chain of Custody/2 - Completing and Preserving Chain of Custody Forms.mp4
147 MB
~Get Your Files Here !/12 - Documenting Evidence and Chain of Custody/3 - Anti-Forensic Techniques and Mitigation Strategies.mp4
56 MB
~Get Your Files Here !/12 - Documenting Evidence and Chain of Custody/4 - Screenshots and Supporting Visual Evidence.mp4
44 MB
~Get Your Files Here !/13 - Finalizing and Presenting Your Forensic Report/1 - Writing Clear Conclusions Based on Evidence.mp4
57 MB
~Get Your Files Here !/13 - Finalizing and Presenting Your Forensic Report/2 - Case Review and Criticism.mp4
69 MB
~Get Your Files Here !/13 - Finalizing and Presenting Your Forensic Report/3 - Ethics and Responsibility in Reporting.mp4
76 MB
~Get Your Files Here !/13 - Finalizing and Presenting Your Forensic Report/4 - Technical Reporting in Digital Forensics.html
474 B
~Get Your Files Here !/13 - Finalizing and Presenting Your Forensic Report/5 - Reporting Digital Evidence and Analysis Findings _Module 4.pdf.pdf
211 kB
~Get Your Files Here !/13 - Finalizing and Presenting Your Forensic Report/5 - The Use of Forensic Case Notes.html
236 B
~Get Your Files Here !/14 - Course Conclusion/1 - Course end_Project.pdf.pdf
171 kB
~Get Your Files Here !/14 - Course Conclusion/1 - Image Analysis using Autopsy and Reporting.html
85 B
~Get Your Files Here !/14 - Course Conclusion/2 - Course Wrap-up Video.mp4
105 MB
~Get Your Files Here !/2 - Introduction to Digital Forensics/1 - Introduction to Section.mp4
44 MB
~Get Your Files Here !/2 - Introduction to Digital Forensics/2 - What Is Digital Forensics.mp4
40 MB
~Get Your Files Here !/2 - Introduction to Digital Forensics/3 - The Forensic Process.mp4
72 MB
~Get Your Files Here !/2 - Introduction to Digital Forensics/4 - Types of Digital Evidence.mp4
58 MB
~Get Your Files Here !/3 - Scope of Digital Forensics in Cybersecurity/1 - Where Digital Forensics Fits in the Cybersecurity Life Cycle.mp4
97 MB
~Get Your Files Here !/3 - Scope of Digital Forensics in Cybersecurity/2 - Real-World Use Cases Insider Threats.mp4
79 MB
~Get Your Files Here !/3 - Scope of Digital Forensics in Cybersecurity/3 - Potential Sources of Evidence.mp4
169 MB
~Get Your Files Here !/3 - Scope of Digital Forensics in Cybersecurity/4 - A Proactive Approach to Network Forensics Intrusion Using Dynamic Features Selec.html
565 B
~Get Your Files Here !/4 - Legal, Ethical, and Professional Considerations/1 - Chain of Custody and Admissibility in Court.mp4
67 MB
~Get Your Files Here !/4 - Legal, Ethical, and Professional Considerations/2 - Privacy, Consent, and Ethical Boundaries.mp4
95 MB
~Get Your Files Here !/4 - Legal, Ethical, and Professional Considerations/3 - Regional and International Laws Impacting Digital Evidence.mp4
122 MB
~Get Your Files Here !/4 - Legal, Ethical, and Professional Considerations/4 - What Is Digital Chain of Custody.html
476 B
~Get Your Files Here !/4 - Legal, Ethical, and Professional Considerations/5 - Analysis of a Case Study on Digital Forensics Using FTK Toolkit and Autopsy.html
289 B
~Get Your Files Here !/4 - Legal, Ethical, and Professional Considerations/5 - Matching the Digital Forensics Process with the Right Activity_Module 1.pdf.pdf
243 kB
~Get Your Files Here !/5 - The Evidence Acquisition Process/1 - Introduction to Section.mp4
19 MB
~Get Your Files Here !/5 - The Evidence Acquisition Process/2 - Types of Acquisition and Image Formats.mp4
101 MB
~Get Your Files Here !/5 - The Evidence Acquisition Process/3 - Precautions During Evidence Handling.mp4
63 MB
~Get Your Files Here !/5 - The Evidence Acquisition Process/4 - Write Blockers and Imaging Best Practices.mp4
33 MB
~Get Your Files Here !/6 - Using Forensic Tools for Disk Imaging/1 - Disk Imaging with FTK Imager and Analysis in Autopsy.mp4
77 MB
~Get Your Files Here !/6 - Using Forensic Tools for Disk Imaging/2 - Bit-by-Bit Imaging Using DD (Linux CLI).mp4
76 MB
~Get Your Files Here !/6 - Using Forensic Tools for Disk Imaging/3 - Hashing for Integrity (MD5SHA1SHA256).mp4
87 MB
~Get Your Files Here !/7 - Preserving Evidence and Chain of Custody/1 - Maintaining Forensic Soundness.mp4
39 MB
~Get Your Files Here !/7 - Preserving Evidence and Chain of Custody/2 - Chain of Custody Concept and Importance.mp4
64 MB
~Get Your Files Here !/7 - Preserving Evidence and Chain of Custody/3 - Labelling and Evidence Bagging Procedures.mp4
70 MB
~Get Your Files Here !/7 - Preserving Evidence and Chain of Custody/4 - Protecting Digital Evidence Integrity and Preserving Chain of Custody.html
557 B
~Get Your Files Here !/7 - Preserving Evidence and Chain of Custody/5 - Investigating User Activity and System Artifacts_Module 2.pdf.pdf
208 kB
~Get Your Files Here !/7 - Preserving Evidence and Chain of Custody/5 - Using DD and MD5SHA256 Hash on Linux.html
246 B
~Get Your Files Here !/8 - Analyzing File Systems and Metadata/1 - Introduction to Section.mp4
40 MB
~Get Your Files Here !/8 - Analyzing File Systems and Metadata/2 - Understanding NTFS, FAT32, and EXT File Systems.mp4
112 MB
~Get Your Files Here !/8 - Analyzing File Systems and Metadata/3 - Metadata MAC Times (Modified, Accessed, Created).mp4
142 MB
~Get Your Files Here !/8 - Analyzing File Systems and Metadata/4 - Recovering Hidden, Deleted, or Orphaned Files.mp4
115 MB
~Get Your Files Here !/9 - Investigating User Activity and System Artifacts/1 - Analyzing Browser History and Cookies.mp4
92 MB
~Get Your Files Here !/9 - Investigating User Activity and System Artifacts/3 - Tracking Document Access and USB Device Usage.mp4
155 MB
~Get Your Files Here !/9 - Investigating User Activity and System Artifacts/4 - Interpreting Log Files (Windows Event Logs, Syslog).mp4
128 MB
~Get Your Files Here !/Bonus Resources.txt
70 B