|
![]() |
|||
|
||||
OverviewPrint Textbook & Cloud Lab Access: 180-day subscription. The cybersecurity Cloud Labs for Digital Forensics, Investigation, and Response provide fully immersive mock IT infrastructures with live virtual machines and real software, where students will learn and practice the foundational information security skills they will need to excel in their future careers. Unlike simulations, these hands-on virtual labs reproduce the complex challenges of the real world, without putting an institution's assets at risk. Available as a standalone lab solution or bundled with Jones & Bartlett Learning textbooks, these cybersecurity Cloud Labs are an essential tool for mastering key course concepts through hands-on training. Labs: Lab 1: Applying the Daubert Standard to Forensic Evidence Lab 2: Recognizing the Use of Steganography in Forensic Evidence Lab 3: Recovering Deleted and Damaged Files Lab 4: Conducting an Incident Response Investigation Lab 5: Conducting Forensic Investigations on Windows Systems Lab 6: Conducting Forensic Investigations on Linux Systems Lab 7: Conducting Forensic Investigations on Email and Chat Logs Lab 8: Conducting Forensic Investigations on Mobile Devices Lab 9: Conducting Forensic Investigations on Network Infrastructure Lab 10: Conducting Forensic Investigations on System Memory Supplemental Lab 1: Conducting Forensic Investigations on Cloud Services Supplemental Lab 2: Conducting Forensic Investigations on Social Media "" Full Product DetailsAuthor: Chuck EasttomPublisher: Jones and Bartlett Publishers, Inc Imprint: Jones and Bartlett Publishers, Inc Edition: 4th New edition Weight: 0.907kg ISBN: 9781284244489ISBN 10: 1284244482 Pages: 277 Publication Date: 24 August 2021 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsReviewsAuthor InformationDr. Chuck Easttom is the author of 32' books, including several on computer security, forensics, and cryptography.' He has also authored scientific papers on digital forensics, cyber warfare, machine learning, cryptography, and applied mathematics. He is an inventor with 22 computer science patents.'He holds a Doctor of Science (D.Sc.) in cyber security, a Ph.D. in nanotechnology, a Ph.D. in computer science,'and three master’s degrees (one in applied computer science, one in education,'and one in systems engineering). He is a senior member of both the IEEE and the ACM. He is also a Distinguished Speaker of the ACM and a Distinguished Visitor of the IEEE.He also holds 55 industry certifications including many cyber security and digital forensics certifications. He has both academic and hands on forensics experience. He has served as an expert witness in U.S. court cases since 2004.' He is currently an adjunct lecturer for Georgetown University where he teaches cyber security, systems engineer, and cryptography and an adjunct professor for University of Dallas where he teaches a graduate course in digital forensics.' Tab Content 6Author Website:Countries AvailableAll regions |