Security of Information Systems - Lecture 7 : Digital Forensics and Incident Response

Votre vidéo commence dans 10
Passer (5)
cash machine v4

Merci ! Partagez avec vos amis !

Vous avez aimé cette vidéo, merci de votre vote !

Ajoutées by admin
190 Vues
Hello everyone. My name is Furkan Gözükara, and I am a Computer Engineer Ph.D. Assistant Professor at the Software Engineering department.

In this course, we will learn general overview and some in depth information about how to secure online information systems.

Security of online systems and IT is a whole area of profession. You can become expert of this area and find very well paying jobs.

Security of Information Systems Full Course Playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffslM_o92NwkaUzD7C6Fekx26

GitHub repository of the course : https://github.com/FurkanGozukara/Security-of-Information-Systems-CSE413-2020

Discord channel link of the course : https://discord.gg/6Mrb8MwteQ
How to use Discord : https://youtu.be/AEwPtYiLvsQ

This course does not require you to have any knowledge about programming in any programming language.

However, if you want to start learning programming or develop your other Software Engineering related skills you can watch our below full courses:

[1] Introduction to Programming Full Course with C# playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffskoSXySh0MdiayPJsBZ7m2o

[2] Object Oriented Programming Full Course with C# playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffsnH3XJb66FDIHh1yHwWC26I

[3] Artificial Intelligence (AI) and Machine Learning (ML) Full Course with C# Examples playlist: https://www.youtube.com/playlist?list=PL_pbwdIyffskVschrADCL6KEnL_nqDtgD

[4] Software Engineering Full Course playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffslgxMVyXhnHiSn_EWTvx1G-

[5] Security of Information Systems Full Course playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffslM_o92NwkaUzD7C6Fekx26

[6] (Turkish) Bilgisayar Becerileri Tam Ders playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffsmyE2e909ea1MXLcMb8MenG

Lecture 7: Digital Forensics and Incident Response

• Incident Response
• Digital Forensics
• Finding Evidence
• Demos
• Who does this?
• Incident Response
• Incident Management
• Incident Response Policy
• Incident Response Policy
• Incident Response Team
• Red Team – Blue Team
• Incident Response Procedures
• Detect
• Respond
• Recover
• Digital Forensics
• Digital Forensics in Court
• Digital Forensics
• What is digital evidence?
• Forensic Investigation Process
• At the Crime Scene
• Basic Scientific Principles
• Evidence Location
• Dealing with Evidence
• Admissible Evidence
• Evidence Categories
• Finding Evidence
• Hidden Files
• Locating Hidden Files
• Changing File Extensions
• Discovering Changed File Extensions
• File Signatures
• Obscure File Names
• File Names not an Issue
• Steganography
• Steganography Example
• Discovering Steganography
• Encrypted Files
• “Breaking” Encryption
• Unencrypted data – the arrest of Ross Ulbricht
• Brute force (?) – San Bernadino case
• Exploit weaknesses
• Deleting Files
• How does the System Delete Files?
• Reclaiming Deleted Files
• Reclaiming Overwritten Files
• Metadata
• Using Metadata
• Metadata Example
• It’s not all theory – if you want to learn more…

Auto timed subtitle : success
Catégories
E commerce Ebay

Ajouter un commentaire

Connectez-vous ou inscrivez-vous pour poster un commentaire.

Commentaires

Soyez le premier à commenter cette vidéo.