Hello everyone. My name is Furkan Gözükara, and I am a Computer Engineer Ph.D. Assistant Professor at the Software Engineering department.
In this course, we will learn general overview and some in depth information about how to secure online information systems.
Security of online systems and IT is a whole area of profession. You can become expert of this area and find very well paying jobs.
Security of Information Systems Full Course Playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffslM_o92NwkaUzD7C6Fekx26
GitHub repository of the course : https://github.com/FurkanGozukara/Security-of-Information-Systems-CSE413-2020
Discord channel link of the course : https://discord.gg/6Mrb8MwteQ
How to use Discord : https://youtu.be/AEwPtYiLvsQ
This course does not require you to have any knowledge about programming in any programming language.
However, if you want to start learning programming or develop your other Software Engineering related skills you can watch our below full courses:
[1] Introduction to Programming Full Course with C# playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffskoSXySh0MdiayPJsBZ7m2o
[2] Object Oriented Programming Full Course with C# playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffsnH3XJb66FDIHh1yHwWC26I
[3] Artificial Intelligence (AI) and Machine Learning (ML) Full Course with C# Examples playlist: https://www.youtube.com/playlist?list=PL_pbwdIyffskVschrADCL6KEnL_nqDtgD
[4] Software Engineering Full Course playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffslgxMVyXhnHiSn_EWTvx1G-
[5] Security of Information Systems Full Course playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffslM_o92NwkaUzD7C6Fekx26
[6] (Turkish) Bilgisayar Becerileri Tam Ders playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffsmyE2e909ea1MXLcMb8MenG
Lecture 7: Digital Forensics and Incident Response
• Incident Response
• Digital Forensics
• Finding Evidence
• Demos
• Who does this?
• Incident Response
• Incident Management
• Incident Response Policy
• Incident Response Policy
• Incident Response Team
• Red Team – Blue Team
• Incident Response Procedures
• Detect
• Respond
• Recover
• Digital Forensics
• Digital Forensics in Court
• Digital Forensics
• What is digital evidence?
• Forensic Investigation Process
• At the Crime Scene
• Basic Scientific Principles
• Evidence Location
• Dealing with Evidence
• Admissible Evidence
• Evidence Categories
• Finding Evidence
• Hidden Files
• Locating Hidden Files
• Changing File Extensions
• Discovering Changed File Extensions
• File Signatures
• Obscure File Names
• File Names not an Issue
• Steganography
• Steganography Example
• Discovering Steganography
• Encrypted Files
• “Breaking” Encryption
• Unencrypted data – the arrest of Ross Ulbricht
• Brute force (?) – San Bernadino case
• Exploit weaknesses
• Deleting Files
• How does the System Delete Files?
• Reclaiming Deleted Files
• Reclaiming Overwritten Files
• Metadata
• Using Metadata
• Metadata Example
• It’s not all theory – if you want to learn more…
Auto timed subtitle : success
In this course, we will learn general overview and some in depth information about how to secure online information systems.
Security of online systems and IT is a whole area of profession. You can become expert of this area and find very well paying jobs.
Security of Information Systems Full Course Playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffslM_o92NwkaUzD7C6Fekx26
GitHub repository of the course : https://github.com/FurkanGozukara/Security-of-Information-Systems-CSE413-2020
Discord channel link of the course : https://discord.gg/6Mrb8MwteQ
How to use Discord : https://youtu.be/AEwPtYiLvsQ
This course does not require you to have any knowledge about programming in any programming language.
However, if you want to start learning programming or develop your other Software Engineering related skills you can watch our below full courses:
[1] Introduction to Programming Full Course with C# playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffskoSXySh0MdiayPJsBZ7m2o
[2] Object Oriented Programming Full Course with C# playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffsnH3XJb66FDIHh1yHwWC26I
[3] Artificial Intelligence (AI) and Machine Learning (ML) Full Course with C# Examples playlist: https://www.youtube.com/playlist?list=PL_pbwdIyffskVschrADCL6KEnL_nqDtgD
[4] Software Engineering Full Course playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffslgxMVyXhnHiSn_EWTvx1G-
[5] Security of Information Systems Full Course playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffslM_o92NwkaUzD7C6Fekx26
[6] (Turkish) Bilgisayar Becerileri Tam Ders playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffsmyE2e909ea1MXLcMb8MenG
Lecture 7: Digital Forensics and Incident Response
• Incident Response
• Digital Forensics
• Finding Evidence
• Demos
• Who does this?
• Incident Response
• Incident Management
• Incident Response Policy
• Incident Response Policy
• Incident Response Team
• Red Team – Blue Team
• Incident Response Procedures
• Detect
• Respond
• Recover
• Digital Forensics
• Digital Forensics in Court
• Digital Forensics
• What is digital evidence?
• Forensic Investigation Process
• At the Crime Scene
• Basic Scientific Principles
• Evidence Location
• Dealing with Evidence
• Admissible Evidence
• Evidence Categories
• Finding Evidence
• Hidden Files
• Locating Hidden Files
• Changing File Extensions
• Discovering Changed File Extensions
• File Signatures
• Obscure File Names
• File Names not an Issue
• Steganography
• Steganography Example
• Discovering Steganography
• Encrypted Files
• “Breaking” Encryption
• Unencrypted data – the arrest of Ross Ulbricht
• Brute force (?) – San Bernadino case
• Exploit weaknesses
• Deleting Files
• How does the System Delete Files?
• Reclaiming Deleted Files
• Reclaiming Overwritten Files
• Metadata
• Using Metadata
• Metadata Example
• It’s not all theory – if you want to learn more…
Auto timed subtitle : success
- Catégories
- E commerce Ebay
Commentaires