Intermediate Computer Forensics
What you’ll learn
Know different types of investigations and investigative software
Know how to Search a computer image for relevant files both active and deleted
Know how to search a web browser history, recycle bin and Thumbs DB file for evidence
Know the basics of creating a Computer forensics report
Requirements
A basic understanding of what computer forensics is
Recommend that you my other course Computer Forensics Fundamentals, but not required
We will be using mostly open source tools, such as Autopsy and Scalpel which will be downloaded during the course
Description
This course is designed for people with a working knowledge of computer forensics but looking to go deeper into specific skill and techniques of the the field. This is the second course following my pervious course Computer Forensics Fundamentals. While that course is recommended it is not required to take this course as they are independent in regard to topics taught.
Intermediate Computer Forensics will provide: Understanding of Public vs Private investigations Understanding of different types of computer forensics software Disk Image Analysis through searching and keyword listsFile carving and the Thumb DB fileWebsite and Browser history forensicsRecycle bin and deleted files forensicsCreating forensics reports of an investigation
The course will consist of presentations to explain the concepts of computer forensics as well as demonstrations of proper software and collections of digital evidence.
This course is designed for anyone with an interest computer forensics to get a deeper taste of the real world of digital forensics examination.
As an intermediate course it will consist of presentations, hands on lessons and quizs.
Overview
Section 1: Introduction
Lecture 1 Course Overview
Section 2: Public vs. Private Investigations
Lecture 2 Public vs. Private Investigations
Section 3: Types of Investigation Software
Lecture 3 Types of software for investigation
Section 4: Overview of Software and Dowload of Software/Images
Lecture 4 Why this software for this course
Lecture 5 Software used in this Course
Lecture 6 Disk Images
Section 5: Image Analysis
Lecture 7 Using the Software to Analyse an Image
Lecture 8 Searching the Image for Evidence
Section 6: File Carving and Thumbs.db
Lecture 9 File Carving
Lecture 10 Thumbs.db
Lecture 11 Carving a file from the Image
Lecture 12 Analysis of the Thumbs.db
Section 7: Website History and Analysis
Lecture 13 Web Browsers 101 – Types and what information they provide
Lecture 14 Finding the Browser Data and Interpreting
Section 8: Recycle Bin and Deleted Files
Lecture 15 Recycle Bin and Deleted files – Finding files after they ahve been deleted
Lecture 16 Finding evidence in the Recycle Bin
Lecture 17 Finding Deleted Files on the Image
Section 9: Reporting
Lecture 18 Producing Reports from the Investigation
Section 10: Conclution and Wrap Up
Lecture 19 Conclustion and Wrap Up
Lecture 20 Bonus Lecture: More computer forensics
Someone with an interest in learning computer forensics,Someone who wants to know more about how computer stores information and how to find it.,Someone with a cursory knowledge of computer forensics but wants to know more about the details
Course Information:
Udemy | English | 1h 21m | 556.64 MB
Created by: John Boyle
You Can See More Courses in the IT & Software >> Greetings from CourseDown.com