Intermediate Computer Forensics

Learning Intermediate computer forensic skills and techniques
Intermediate Computer Forensics
File Size :
554.95 MB
Total length :
1h 21m



John Boyle


Last update

Last updated 7/2020



Intermediate Computer Forensics

What you’ll learn

Know different types of investigations and investigative software
Know how to Search a computer image for relevant files both active and deleted
Know how to search a web browser history, recycle bin and Thumbs DB file for evidence
Know the basics of creating a Computer forensics report

Intermediate Computer Forensics


A basic understanding of what computer forensics is
Recommend that you my other course Computer Forensics Fundamentals, but not required
We will be using mostly open source tools, such as Autopsy and Scalpel which will be downloaded during the course


This course is designed for people with a working knowledge of computer forensics but looking to go deeper into specific skill and techniques of the the field.  This is the second course following my pervious course Computer Forensics Fundamentals.  While that course is recommended it is not required to take this course as they are independent in regard to topics taught.
Intermediate Computer Forensics will provide: Understanding of Public vs Private investigations Understanding of different types of computer forensics software Disk Image Analysis through searching and keyword listsFile carving and the Thumb DB fileWebsite and Browser history forensicsRecycle bin and deleted files forensicsCreating forensics reports of an investigation
The course will consist of presentations to explain the concepts of computer forensics as well as demonstrations of proper software and collections of digital evidence.
This course is designed for anyone with an interest computer forensics to get a deeper taste of the real world of digital forensics examination.
As an intermediate course it will consist of presentations, hands on lessons and quizs.


Section 1: Introduction

Lecture 1 Course Overview

Section 2: Public vs. Private Investigations

Lecture 2 Public vs. Private Investigations

Section 3: Types of Investigation Software

Lecture 3 Types of software for investigation

Section 4: Overview of Software and Dowload of Software/Images

Lecture 4 Why this software for this course

Lecture 5 Software used in this Course

Lecture 6 Disk Images

Section 5: Image Analysis

Lecture 7 Using the Software to Analyse an Image

Lecture 8 Searching the Image for Evidence

Section 6: File Carving and Thumbs.db

Lecture 9 File Carving

Lecture 10 Thumbs.db

Lecture 11 Carving a file from the Image

Lecture 12 Analysis of the Thumbs.db

Section 7: Website History and Analysis

Lecture 13 Web Browsers 101 – Types and what information they provide

Lecture 14 Finding the Browser Data and Interpreting

Section 8: Recycle Bin and Deleted Files

Lecture 15 Recycle Bin and Deleted files – Finding files after they ahve been deleted

Lecture 16 Finding evidence in the Recycle Bin

Lecture 17 Finding Deleted Files on the Image

Section 9: Reporting

Lecture 18 Producing Reports from the Investigation

Section 10: Conclution and Wrap Up

Lecture 19 Conclustion and Wrap Up

Lecture 20 Bonus Lecture: More computer forensics

Someone with an interest in learning computer forensics,Someone who wants to know more about how computer stores information and how to find it.,Someone with a cursory knowledge of computer forensics but wants to know more about the details

Course Information:

Udemy | English | 1h 21m | 554.95 MB
Created by: John Boyle

You Can See More Courses in the IT & Software >> Greetings from

New Courses

Scroll to Top