comp-forensic : A Practical Guide to Computer Forensics Investigations (Course & Lab)

comp-forensic_pro
comp-forensic
A Practical Guide to Computer Forensics Investigations (Course...
ISBN : 978-1-61691-042-6
The Computer Forensics Investigations course provides a comprehensive knowledge of computer forensics. This knowledge leads to a variety of careers opportunities in software companies, banks, law enforcement, intelligence agencies, and many more. The course offers hands-on activities, numerous case studies and practical applications of computer forensics techniques. Case studies are a highly effective way to demonstrate how particular types of digital evidence have been successfully used in different investigations.

Here's what you will get

Lessons
Lessons
13+
Quizzes
230+
Flashcards
458+
Glossary of terms
458+
TestPrep
Pre-assessment Questions
103+
Post-Assessment Questions
100+
Lab
Performance based lab
15+

Here's what you will learn

  • Introduction
  • Types of Computer Forensics Evidence Recovered
  • What Skills Must a Computer Forensics Investigator Possess?
  • The Importance of Computer Forensics
  • A History of Computer Forensics
  • Training and Education
  • Summary
  • Assessment
  • Introduction
  • Physical and Logical Storage
  • File Conversion and Numbering Formats
  • Operating Systems
  • Windows Registry
  • Microsoft Windows Features
  • Summary
  • Assessment
  • Introduction
  • Hard Disk Drives
  • Cloning a PATA or SATA Hard Disk
  • Removable Memory
  • Summary
  • Assessment
  • References
  • Introduction
  • Lab Requirements
  • Private Sector Computer Forensics Laboratories
  • Computer Forensics Laboratory Requirements
  • Extracting Evidence from a Device
  • Skimmers
  • Summary
  • Assessment
  • Introduction
  • Working Undercover
  • Website Evidence
  • Background Searches on a Suspect
  • Online Crime
  • Capturing Online Communications
  • Summary
  • Assessment
  • Introduction
  • Obtaining Evidence from a Service Provider
  • Documenting a Crime Scene
  • Seizing Evidence
  • Documenting the Evidence
  • Using Tools to Document an Investigation
  • Writing Reports
  • Using Expert Witnesses at Trial
  • Summary
  • Assessment
  • Introduction
  • History and Structure of the United States Legal System
  • Evidence Admissibility
  • Constitutional Law
  • When Computer Forensics Goes Wrong
  • Structure of the Legal System in the European Union (E.U.)
  • Structure of the Legal System in Asia
  • Summary
  • Assessment
  • Introduction
  • The Tools of the Trade
  • Networking Devices
  • Understanding the OSI Model
  • Advanced Persistent Threats
  • Investigating a Network Attack
  • Summary
  • Assessment
  • Introduction
  • The Cellular Network
  • Handset Specifications
  • Mobile Operating Systems
  • Standard Operating Procedures for Handling Handset Evidence
  • Handset Forensics
  • Manual Cellphone Examinations
  • Global Satellite Service Providers
  • Legal Considerations
  • Other Mobile Devices
  • Summary
  • Assessment
  • Introduction
  • Understanding Digital Photography
  • Examining Picture Files
  • Evidence Admissibility
  • Case Studies
  • Summary
  • Assessment
  • Introduction
  • A Brief History
  • Macintosh File Systems
  • Forensic Examinations of a Mac
  • Macintosh Operating Systems
  • Apple Mobile Devices
  • Case Studies
  • Summary
  • Assessment
  • Introduction
  • Zacharias Moussaoui
  • BTK (Bind Torture Kill) Killer
  • Cyberbullying
  • Sports
  • Summary
  • Assessment
  • Assessment of Cases by Judges

Hands on Activities (Labs)

  • Using a Hex editor
  • Using FTK Imager
  • Exploring Windows file registry
  • Using Disk Defragmenter
  • Using Event Viewer
  • Reading the contents of a secure digital card
  • Using a numeric IP address to locate a Web Server
  • Printing the screen using MAC
  • Viewing the contents of index.dat
  • Locating local cell towers and antennae
  • Viewing the IMEI through the keypad
  • Identifying the features of a cellular phone
  • Converting Epoch time
  • Working in the Terminal window
uCertify

uCertify provides courses, simulator, labs, test prep kits for IT certifications including Microsoft, Oracle, Cisco, CompTIA, CIW, PMI, ISC2, Linux, Zend, Google, IC3 , Adobe and many more.

© 2002-2017 uCertify. All Rights Reserved
app_store
google_play