Operating System Forensics.
(eVideo)

Book Cover
Average Rating
Published
Carpenteria, CA linkedin.com, 2019.
Status

Description

Loading Description...

Also in this Series

Checking series information...

More Like This

Loading more titles like this title...

More Details

Format
eVideo
Language
English

Notes

General Note
8/27/201912:00:00AM
Participants/Performers
Presenter: Jungwoo Ryoo
Description
Learn the fundamentals of operating system forensics. Find out how to recover evidence from the operating system of any computer.
Description
Criminals rely on the intricacies of operating systems like Windows, macOS, and Linux to conceal their activities and hide data. However, a skilled digital forensics expert knows the places to look and the tools to use to access evidence of their crimes. This course covers all the major concepts and tools of the growing field of operating system forensics. Instructor Jungwoo Ryoo (J.R.) reviews the fundamentals: the goals, history, and roles of operating system forensics and the future of the industry. He then shows how to acquire evidence from file systems, slack space, alternate data streams, and main memory. He uses a combination of free and commercial software, so students can practice techniques like file recovery and live acquisition with the tools that are within their budgets.
System Details
Latest version of the following browsers: Chrome, Safari, Firefox, or Internet Explorer. Adobe Flash Player Plugin. JavaScript and cookies must be enabled. A broadband Internet connection.

Citations

APA Citation, 7th Edition (style guide)

Ryoo, J. (2019). Operating System Forensics . linkedin.com.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Ryoo, Jungwoo. 2019. Operating System Forensics. linkedin.com.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Ryoo, Jungwoo. Operating System Forensics linkedin.com, 2019.

MLA Citation, 9th Edition (style guide)

Ryoo, Jungwoo. Operating System Forensics linkedin.com, 2019.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Grouped Work ID
5bce4b7c-f1c3-9b8b-9df3-b465a8e12f91-eng
Go To Grouped Work

Grouping Information

Grouped Work ID5bce4b7c-f1c3-9b8b-9df3-b465a8e12f91-eng
Full titleoperating system forensics
Authorryoo jungwoo
Grouping Categorymovie
Last Update2024-04-15 10:54:20AM
Last Indexed2024-05-17 23:36:14PM

Book Cover Information

Image Sourcesideload
First LoadedApr 20, 2023
Last UsedMay 13, 2024

Marc Record

First DetectedAug 03, 2021 02:19:42 PM
Last File Modification TimeApr 15, 2024 11:00:13 AM

MARC Record

LEADER02228ngm a22003133i 4500
001LDC5019809
003LDC
00520240415154237.8
006m        c        
007cr cna       a
008240415s2019    cau100        o   vleng d
040 |a linkedin.com|b eng
050 4|a LDC5019809
1001 |a Ryoo, Jungwoo|e speaker.
24510|a Operating System Forensics.|c with Jungwoo Ryoo
264 1|a Carpenteria, CA|b linkedin.com,|c 2019.
306 |a 01h:40m:34s
337 |a computer|2 rdamedia
338 |a online resource|2 rdacarrier
500 |a 8/27/201912:00:00AM
5111 |a Presenter: Jungwoo Ryoo
520 |a Learn the fundamentals of operating system forensics. Find out how to recover evidence from the operating system of any computer.
520 |a Criminals rely on the intricacies of operating systems like Windows, macOS, and Linux to conceal their activities and hide data. However, a skilled digital forensics expert knows the places to look and the tools to use to access evidence of their crimes. This course covers all the major concepts and tools of the growing field of operating system forensics. Instructor Jungwoo Ryoo (J.R.) reviews the fundamentals: the goals, history, and roles of operating system forensics and the future of the industry. He then shows how to acquire evidence from file systems, slack space, alternate data streams, and main memory. He uses a combination of free and commercial software, so students can practice techniques like file recovery and live acquisition with the tools that are within their budgets.
538 |a Latest version of the following browsers: Chrome, Safari, Firefox, or Internet Explorer. Adobe Flash Player Plugin. JavaScript and cookies must be enabled. A broadband Internet connection.
655 4|a Instructional films.|2 lcgft
655 4|a Educational films.|2 lcgft
7102 |a linkedin.com (Firm)
85640|u https://www.linkedin.com/learning/operating-system-forensics?u=103732282&auth=true|z View course details on linkedin.com/learning
85642|3 thumbnail|u https://media.licdn.com/dms/image/C4E0DAQFE22Fo-HsjaQ/learning-public-crop_288_512/0/1568669375685?e=2147483647&v=beta&t=PWhOvbqjkS3ZW34ERO9iC85ep7MByfb5gWQGMhkjU00