5 hours 56 minutes

Video Transcription

Hey, everybody, welcome back to the course. So in the last video, we talked about the different types of file system. So we talked about fat ante F s and then also the linens file system. So extended file systems. So E x T e x t to t x t three and t x t four.
In this video, we're gonna talk about H F s and H f s plus for Mac, but very briefly. And then we'll also take a high level overview of the different raid level. So again, the rate levels are definitely something you want to know for the examination.
So H f s in h f s. Plus, that's a heroic O file system. So that kind of difference there H f s uses 16 bit allocation blocks. H f s plus uses a beach restructure or so specifically for your exam. Remember that H f s plus uses a bee tree structure
just in case it's tested on there. That was kind of one of the more popular angles inside of the official. We see counter material so generally when they mentioned stuff multiple times, you usually see it on their examinations.
so raid eso What? We'll talk about what it means here in just a second, right? We have different levels here, as as shown, we'll talk about each one what that means.
So Rada stands for return it array. It used to be of inexpensive disk. You might see it nowadays listens as redundant array of independent disc eso just kind of depends on what you're looking at for a source on what is called, but at the end of the day, it's still our a i D. And it's still spells raid. So that's what we go off.
So right. Zero sum of things with that one. It it's for it offers destroyed striping, but known redundancy, right? So if one of them fails, were done and then ah requires two drives minimum.
It's a raid. One it offered nearing s o. The cool thing. There were offers redundancy, right? So if one of my disk fails, you know, I've still got an exact copy on the other disk of my data and so I can just keep going Now This one also has requirements or requires two drives minimum.
We've also got raid too. So this one here doesn't use any purity marrying or striping. So that's a little different than Miguel. The other raid levels. This one split state at the bit level, then distributes that data to multiple disks.
We have raid three. So at this one here uses bite level striping on and then also a dedicated period. Dis So this one also stores check sums.
And then, um, you know, this one's unable to cater to multiple data requests at the same time. So that's one thing you'll definitely want to remember as well.
We have read five, which is usually we use is bite level data striping. It also requires three drives minimum. So my canisters minimum requirement here for the raid. Just make sure you memorize like, for example, rate five has three drives minimum. This ray level has this. This one has this etcetera
on. Then we have Ray 10 or raid one plus zero. So this one actually combines a CZ. The name implies raids your own raid one. So it's a compliancy striping in the mirroring. It requires four drives minimums, so that's one aspect of it is a little more expensive than other options,
and then the cultural tolerance is actually similar to raid one.
And then, um, if two disc in the same mirrored pair fail thin, the date is not gonna be available. Right? So that's some common sense, sir, But just in case you didn't know that,
so just one quick post assessment question here. So this type of raid combines smearing and striping.
All right, so if he entered a raid 10 or, you know, if he screamed out at the at the computer? Hey, it's raid one plus zero. Both of them. We used interchangeably. So, Ray, 10 in that list, is he correct? Answer there.
All right, So this video, we talked about the different rate levels as well. It's just kind of a brief overview of h f I. Excuse me, h f s and H f s plus.
So, the next video, we're gonna talk about things like file carving, how to analyze different image files, and then also the sluice kit

Up Next

Computer Hacking and Forensics

Love the idea of digital forensics investigation? That is what computer forensics is all about. You will learn how to; determine potential online criminal activity at its inception, legally gather evidence, search and investigate wireless attacks.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor