A Practical Guide to Computer Forensics Investigations

(comp-forensic)/ISBN:978-1-61691-042-6

This course includes
Lessons
TestPrep
Hand-on Lab
Video Lessons (Add-on)

Enroll yourself in A Practical Guide to Computer Forensics Investigations course and lab to know about computer forensics investigation. The lab provides a hands-on learning experience in a safe and online environment. The computer forensics training course provides skills on topics such as network, mobile, and photograph forensics, online investigations, and many more. The Computer Forensics course offers hands-on activities, numerous case studies, and practical applications of computer forensic techniques.

Lessons

13+ Lessons | 230+ Quizzes | 458+ Flashcards | 458+ Glossary of terms

TestPrep

100+ Pre Assessment Questions | 100+ Post Assessment Questions |

Hand on lab

14+ LiveLab | 15+ Video tutorials | 00+ Minutes

Video Lessons

90+ Videos | 13:21+ Hours

Here's what you will learn

Download Course Outline

Lessons 1: Introduction

Lessons 2: The Scope of Computer Forensics

  • Introduction
  • Types of Computer Forensics Evidence Recovered
  • What Skills Must a Computer Forensics Investigator Possess?
  • The Importance of Computer Forensics
  • A History of Computer Forensics
  • Training and Education
  • Summary
  • Assessment

Lessons 3: Windows Operating and File Systems

  • Introduction
  • Physical and Logical Storage
  • File Conversion and Numbering Formats
  • Operating Systems
  • Windows Registry
  • Microsoft Windows Features
  • Summary
  • Assessment

Lessons 4: Handling Computer Hardware

  • Introduction
  • Hard Disk Drives
  • Cloning a PATA or SATA Hard Disk
  • Removable Memory
  • Summary
  • Assessment
  • References

Lessons 5: Acquiring Evidence in a Computer Forensics Lab

  • Introduction
  • Lab Requirements
  • Private Sector Computer Forensics Laboratories
  • Computer Forensics Laboratory Requirements
  • Extracting Evidence from a Device
  • Skimmers
  • Summary
  • Assessment

Lessons 6: Online Investigations

  • Introduction
  • Working Undercover
  • Website Evidence
  • Background Searches on a Suspect
  • Online Crime
  • Capturing Online Communications
  • Summary
  • Assessment

Lessons 7: Documenting the Investigation

  • Introduction
  • Obtaining Evidence from a Service Provider
  • Documenting a Crime Scene
  • Seizing Evidence
  • Documenting the Evidence
  • Using Tools to Document an Investigation
  • Writing Reports
  • Using Expert Witnesses at Trial
  • Summary
  • Assessment

Lessons 8: Admissibility of Digital Evidence

  • Introduction
  • History and Structure of the United States Legal System
  • Evidence Admissibility
  • Constitutional Law
  • When Computer Forensics Goes Wrong
  • Structure of the Legal System in the European Union (E.U.)
  • Structure of the Legal System in Asia
  • Summary
  • Assessment

Lessons 9: Network Forensics

  • Introduction
  • The Tools of the Trade
  • Networking Devices
  • Understanding the OSI Model
  • Advanced Persistent Threats
  • Investigating a Network Attack
  • Summary
  • Assessment

Lessons 10: Mobile Forensics

  • Introduction
  • The Cellular Network
  • Handset Specifications
  • Mobile Operating Systems
  • Standard Operating Procedures for Handling Handset Evidence
  • Handset Forensics
  • Manual Cellphone Examinations
  • Global Satellite Service Providers
  • Legal Considerations
  • Other Mobile Devices
  • Summary
  • Assessment

Lessons 11: Photograph Forensics

  • Introduction
  • Understanding Digital Photography
  • Examining Picture Files
  • Evidence Admissibility
  • Case Studies
  • Summary
  • Assessment

Lessons 12: Mac Forensics

  • Introduction
  • A Brief History
  • Macintosh File Systems
  • Forensic Examinations of a Mac
  • Macintosh Operating Systems
  • Apple Mobile Devices
  • Case Studies
  • Summary
  • Assessment

Lessons 13: Case Studies

  • Introduction
  • Zacharias Moussaoui
  • BTK (Bind Torture Kill) Killer
  • Cyberbullying
  • Sports
  • Summary
  • Assessment
  • Assessment of Cases by Judges

Hands-on LAB Activities

Windows Operating and File Systems

  • Using a Hex Editor
  • Using FTK Imager
  • Exploring Windows File Registry
  • Using the Disk Defragmenter
  • Using Event Viewer

Handling Computer Hardware

  • Reading the Contents of a Secure Digital Card

Acquiring Evidence in a Computer Forensics Lab

  • Imaging RAM using FTK Imager

Online Investigations

  • Using a Numeric IP Address to Locate a Web Server
  • Printing the Screen Using MAC

Mobile Forensics

  • Locating Local Cell Towers and Antennae
  • Viewing the IMEI through the keypad
  • Identifying the Features of a Cellular Phone

Mac Forensics

  • Converting Epoch Time
  • Working in the Terminal window

Customer Review

The computer forensic course is cut out for those who work for the law enforcement or private forensics entity. It comes with well-sorted topics, performance-based labs, and test questions to reinforce the understanding.

The inclusion of flashcards makes it easy for memorizing terms and the labs also ensure that the analyst has a practical touch of the forensics process. The quizzes, pre-assessment and post-assessment questions ensure that your knowledge is well tested.