Cyber Defense 2200 Mac OS

In 34th episode of the Digital Forensic Survival Podcast Michael Leclair talks about his favourite tools for OS X forensics. He presents a wide list of forensic tools, which can be used for solving common problems, such as imaging, file analysis, data carving, decryption, email analysis, etc. If you are unable to find and download the content, please report broken link issues to the DoD Cyber Exchange Web team at dod.cyberexchange@mail.mil. For all questions related to the STIG content, please contact the DISA STIG Customer Support Desk at disa.stigspt@mail.mil.

Each student is required to have a reliable laptop capable of running software provided by the university, such as JetBrains IDEs, Jupyter Lab, Visual Studio, Wireshark, and other compilers and related programs. The following minimum specifications for a laptop are strongly recommended.

2200

Cyber Defense 2200 Mac Os Update

  • CPU: modern 64 bit processor with at least two physical cores
  • RAM: 8 GB (minimum)
  • Storage capacity: 256 GB (minimum)

Cyber Defense 2200 Mac Os Pro

Most modern operating systems should work fine. Popular choices include Windows, Mac OS, and Linux. Virtual machine software, theCyber Security Engineering Lab, and cloud compute resources will also be provided to support running required software.