Computer Security: Investigation and Response

Computer Security: Investigation and Response

Online Periodical or Article - 2015
Rate this:
Cybersecurity is a growing area of IT. Qualified computer forensics techs are in demand. But even if you aren't a forensics specialist, it can be useful to know how to collect evidence of harassment, hacking, and identity theft on your own computer or mobile phone. This course covers the basics of computer forensics and cyber crime investigation. Author Sandra Toner provides an overview of forensic science, and discusses best practices in the field and the frameworks professionals use to conduct investigations. Then, after showing how to set up a simple lab, Sandra describes how to respond to a cyber incident without disturbing the crime scene. She dives deep into evidence collection and recovery, explaining the differences between collecting evidence from Windows, Mac, and Linux machines. The course wraps up with a look at some of the more commonly used computer forensics software tools.
Learn the basics of computer forensics and investigating cyber crimes. Find out how to collect and recover evidence of cyber crimes such as harassment and identity theft on Mac, Windows, and Linux computers.
Publisher: Carpenteria, CA lynda.com, 2015.
Copyright Date: �2015
Additional Contributors: Lynda.com (Firm)

Related Resources


Opinion

From the critics


Community Activity

Comment

Add a Comment

There are no comments for this title yet.

Age

Add Age Suitability

There are no ages for this title yet.

Summary

Add a Summary

There are no summaries for this title yet.

Notices

Add Notices

There are no notices for this title yet.

Quotes

Add a Quote

There are no quotes for this title yet.

Explore Further

Browse by Call Number

Recommendations

Subject Headings

  Loading...

Find it at MCPL

  Loading...
[]
[]
To Top