Operating System Forensics.
(eVideo)
Author
Contributors
Published
Carpenteria, CA linkedin.com, 2019.
Status
Description
Loading Description...
Also in this Series
Checking series information...
More Details
Format
eVideo
Language
English
Notes
General Note
8/27/201912:00:00AM
Participants/Performers
Presenter: Jungwoo Ryoo
Description
Learn the fundamentals of operating system forensics. Find out how to recover evidence from the operating system of any computer.
Description
Criminals rely on the intricacies of operating systems like Windows, macOS, and Linux to conceal their activities and hide data. However, a skilled digital forensics expert knows the places to look and the tools to use to access evidence of their crimes. This course covers all the major concepts and tools of the growing field of operating system forensics. Instructor Jungwoo Ryoo (J.R.) reviews the fundamentals: the goals, history, and roles of operating system forensics and the future of the industry. He then shows how to acquire evidence from file systems, slack space, alternate data streams, and main memory. He uses a combination of free and commercial software, so students can practice techniques like file recovery and live acquisition with the tools that are within their budgets.
System Details
Latest version of the following browsers: Chrome, Safari, Firefox, or Internet Explorer. Adobe Flash Player Plugin. JavaScript and cookies must be enabled. A broadband Internet connection.
Citations
APA Citation, 7th Edition (style guide)
Ryoo, J. (2019). Operating System Forensics . linkedin.com.
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)Ryoo, Jungwoo. 2019. Operating System Forensics. linkedin.com.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)Ryoo, Jungwoo. Operating System Forensics linkedin.com, 2019.
MLA Citation, 9th Edition (style guide)Ryoo, Jungwoo. Operating System Forensics linkedin.com, 2019.
Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.
Staff View
Grouped Work ID
5bce4b7c-f1c3-9b8b-9df3-b465a8e12f91-eng
Grouping Information
Grouped Work ID | 5bce4b7c-f1c3-9b8b-9df3-b465a8e12f91-eng |
---|---|
Full title | operating system forensics |
Author | ryoo jungwoo |
Grouping Category | movie |
Last Update | 2024-04-15 10:54:20AM |
Last Indexed | 2024-05-17 23:36:14PM |
Book Cover Information
Image Source | sideload |
---|---|
First Loaded | Apr 20, 2023 |
Last Used | May 13, 2024 |
Marc Record
First Detected | Aug 03, 2021 02:19:42 PM |
---|---|
Last File Modification Time | Apr 15, 2024 11:00:13 AM |
MARC Record
LEADER | 02228ngm a22003133i 4500 | ||
---|---|---|---|
001 | LDC5019809 | ||
003 | LDC | ||
005 | 20240415154237.8 | ||
006 | m c | ||
007 | cr cna a | ||
008 | 240415s2019 cau100 o vleng d | ||
040 | |a linkedin.com|b eng | ||
050 | 4 | |a LDC5019809 | |
100 | 1 | |a Ryoo, Jungwoo|e speaker. | |
245 | 1 | 0 | |a Operating System Forensics.|c with Jungwoo Ryoo |
264 | 1 | |a Carpenteria, CA|b linkedin.com,|c 2019. | |
306 | |a 01h:40m:34s | ||
337 | |a computer|2 rdamedia | ||
338 | |a online resource|2 rdacarrier | ||
500 | |a 8/27/201912:00:00AM | ||
511 | 1 | |a Presenter: Jungwoo Ryoo | |
520 | |a Learn the fundamentals of operating system forensics. Find out how to recover evidence from the operating system of any computer. | ||
520 | |a Criminals rely on the intricacies of operating systems like Windows, macOS, and Linux to conceal their activities and hide data. However, a skilled digital forensics expert knows the places to look and the tools to use to access evidence of their crimes. This course covers all the major concepts and tools of the growing field of operating system forensics. Instructor Jungwoo Ryoo (J.R.) reviews the fundamentals: the goals, history, and roles of operating system forensics and the future of the industry. He then shows how to acquire evidence from file systems, slack space, alternate data streams, and main memory. He uses a combination of free and commercial software, so students can practice techniques like file recovery and live acquisition with the tools that are within their budgets. | ||
538 | |a Latest version of the following browsers: Chrome, Safari, Firefox, or Internet Explorer. Adobe Flash Player Plugin. JavaScript and cookies must be enabled. A broadband Internet connection. | ||
655 | 4 | |a Instructional films.|2 lcgft | |
655 | 4 | |a Educational films.|2 lcgft | |
710 | 2 | |a linkedin.com (Firm) | |
856 | 4 | 0 | |u https://www.linkedin.com/learning/operating-system-forensics?u=103732282&auth=true|z View course details on linkedin.com/learning |
856 | 4 | 2 | |3 thumbnail|u https://media.licdn.com/dms/image/C4E0DAQFE22Fo-HsjaQ/learning-public-crop_288_512/0/1568669375685?e=2147483647&v=beta&t=PWhOvbqjkS3ZW34ERO9iC85ep7MByfb5gWQGMhkjU00 |