Это двуязычная снимок страницы, сохраненная пользователем в 2025-1-23 22:30 для https://iclass.eccouncil.org/lessons/module-03-understanding-hard-disks-and-file-systems-2/, предоставлено с двуязычной поддержкой от Иммерсивный перевод. Узнать, как сохранить?

We Care

Ensuring that you get the best experience is our only purpose for using cookies. If you wish to continue, please accept. You are welcome to provide a controlled consent by visiting the cookie settings. For any further queries or information, please see our privacy policy.

Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

Other uncategorised cookies are those that are being analysed and have not been classified into a category as yet.

Powered by Cookieyes logo
Take Notes

Reset Dimensions

Skip to main content
1-888-330-HACK
  • Home
  • Courses
    • Executive Management

      Certified Chief Information Security Officer (CCISO)

      Risk Management Approach and Practices (RM)

      Ethical Hacking

      Certified Ethical Hacker (CEH)

      Ethical Hacking Core Skills (EHCS)

      Network Security

      Certified Cybersecurity Technician (CCT)

      Certified Network Defender (CND)

      ICS/SCADA Cybersecurity

      Computer Forensics

      Computer Hacking Forensic Investigator (CHFI)

      Dark Web Forensics

      Malware and Memory Forensics

      Mobile Forensics

      Incident Handling

      Certified Incident Handler (ECIH)

      Certified SOC Analyst (CSA)

      Certified Threat Intelligence Analyst (CTIA)

      Pen Testing

      Certified Penetration Testing Professional (CPENT)

      Web Application | Hacking & Security

      Application Security

      Certified Application Security Engineer (CASE .NET)

      Certified Application Security Engineer (CASE Java)

      EC-Council Certified DevSecOps Engineer (ECDE)

      Encryption

      Certified Encryption Specialist (ECES)

      Mobile Security Toolkit

      STORM: Ethical Hacking Core Skills

      STORM: Ethical Hacking Intermediate Skills

      IT Project Management

      Certified Project Management (CPM)

      Cloud Security

      Certified Cloud Security Engineer (CCSE)

      Drone Program

      Drone Hacking

      Fundamentals

      Ethical Hacking Essentials

      Digital Forensics Essentials

      Network Defense Essentials

      Threat Intelligence Essentials

      SOC Essentials  Основы SOC

      IoT Security Essentials  Основы безопасности Интернета вещей

      DevSecOps Essentials  Основы DevSecOps

      Cloud Security Essentials
      Основы облачной безопасности

      Certified Secure Computer User (CSCU)
      Сертифицированный пользователь защищенного компьютера (CSCU)

  • Training  Тренировка
    • Live Course Schedule  Расписание курсов в режиме реального времени
      • North America  Северная Америка
      • Everywhere Else  Везде
    • Learning Options  Варианты обучения
    • Financing Options  Варианты финансирования
    • First Look Series  Серия «Первый взгляд»
    • Career Training Paths
    • Resources
      • Whitepapers
  • Security Channel
  • About
  • Store
    • Mobile Security Toolkit
    • Textbooks
    • T-Shirts & Merch
  • Contact Us
  • My Account
Search
My cart

No products in the cart.

  • Home
  • Courses
    • Executive Management

      Certified Chief Information Security Officer (CCISO)

      Risk Management Approach and Practices (RM)

      Ethical Hacking

      Certified Ethical Hacker (CEH)

      Ethical Hacking Core Skills (EHCS)

      Network Security

      Certified Cybersecurity Technician (CCT)

      Certified Network Defender (CND)

      ICS/SCADA Cybersecurity

      Computer Forensics

      Computer Hacking Forensic Investigator (CHFI)

      Dark Web Forensics

      Malware and Memory Forensics

      Mobile Forensics

      Incident Handling

      Certified Incident Handler (ECIH)

      Certified SOC Analyst (CSA)

      Certified Threat Intelligence Analyst (CTIA)

      Pen Testing

      Certified Penetration Testing Professional (CPENT)

      Web Application | Hacking & Security

      Application Security

      Certified Application Security Engineer (CASE .NET)

      Certified Application Security Engineer (CASE Java)

      EC-Council Certified DevSecOps Engineer (ECDE)

      Encryption

      Certified Encryption Specialist (ECES)

      Mobile Security Toolkit

      STORM: Ethical Hacking Core Skills

      STORM: Ethical Hacking Intermediate Skills

      IT Project Management

      Certified Project Management (CPM)

      Cloud Security

      Certified Cloud Security Engineer (CCSE)

      Drone Program

      Drone Hacking

      Fundamentals

      Ethical Hacking Essentials

      Digital Forensics Essentials

      Network Defense Essentials

      Threat Intelligence Essentials

      SOC Essentials

      IoT Security Essentials

      DevSecOps Essentials

      Cloud Security Essentials

      Certified Secure Computer User (CSCU)

  • Training
    • Live Course Schedule
      • North America
      • Everywhere Else
    • Learning Options
    • Financing Options
    • First Look Series
    • Career Training Paths
    • Resources
      • Whitepapers
  • Security Channel
  • About
  • Store
    • Mobile Security Toolkit
    • Textbooks
    • T-Shirts & Merch
  • Contact Us
  • My Account
Search
My cart
EC-Council Learning
Home / Module 03: Understanding Hard Disks and File Systems

Module 03: Understanding Hard Disks and File Systems



← Previous Lesson Next Lesson →

Categories: Uncategorized

Post navigation

Previous post: Module 02: Computer Forensics Investigation Process
Next post: Module 04: Data Acquisition and Duplication
  Course Progress
  Course Navigation
CHFI v11 Introduction
Module 01: Computer Forensics in Todays World
Module 02: Computer Forensics Investigation Process
Module 03: Understanding Hard Disks and File Systems
Module 04: Data Acquisition and Duplication
Module 05: Defeating Anti-forensics Techniques
Module 06: Windows Forensics
Module 07: Linux and Mac Forensics
Module 08: Network Forensics
Module 09: Malware Forensics
Module 10: Investigating Web Attacks
Module 11: Dark Web Forensics
Module 12: Cloud Forensics
Module 13: Email and Social Media Forensics
Module 14: Mobile Forensics
Module 15: IoT Forensics
CHFI v11 Lab Tools
Return to Computer Hacking Forensic Investigator (CHFIv11)
  • 1-888-330-HACK
    Mon - Fri / 8:00AM - 5:00PM
Featured Courses
  • CEH
  • CCISO
  • CHFI
  • CPENT
Featured White Paper
  • Shadow IT by Tari Schreider
Browse
  • Our Courses
  • Learning Options
  • Cart
© EC-Council iClass
Privacy Policy
  • My Account
  • Search
  • Cart 0
Take Notes
adroll_adv_id = "45CU7M3DZFD43HW3NPCGBP"; adroll_pix_id = "4HOS7ZC375GANE7LQGELYY"; adroll_version = "2.0"; adroll_current_page = "other"; adroll_currency = "USD"; adroll_language = "en_US"; adroll_email = "35b987b74d2c7229350010cb049b331c";
We're Online!

How may I help you today?

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.
      START TYPING AND PRESS ENTER TO SEARCH

      Notifications