A Practical Guide to Computer Forensics Investigations

(comp-forensic) / ISBN : 978-1-61691-042-6
This course includes
Interactive Lessons
Gamified TestPrep
Hands-On Labs
Video Lessons (Add-on)
161 Reviews
Get A Free Trial

About This Course

Enroll yourself in A Practical Guide to Computer Forensics Investigations course and lab to know about computer forensics investigation. The lab provides a hands-on learning experience in a safe and online environment. The computer forensics training course provides skills on topics such as network, mobile, and photograph forensics, online investigations, and many more. The Computer Forensics course offers hands-on activities, numerous case studies, and practical applications of computer forensic techniques.

Skills You’ll Get

1

Introduction

2

The Scope of Computer Forensics

  • Introduction
  • Types of Computer Forensics Evidence Recovered
  • What Skills Must a Computer Forensics Investigator Possess?
  • The Importance of Computer Forensics
  • A History of Computer Forensics
  • Training and Education
  • Summary
  • Assessment
3

Windows Operating and File Systems

  • Introduction
  • Physical and Logical Storage
  • File Conversion and Numbering Formats
  • Operating Systems
  • Windows Registry
  • Microsoft Windows Features
  • Summary
  • Assessment
4

Handling Computer Hardware

  • Introduction
  • Hard Disk Drives
  • Cloning a PATA or SATA Hard Disk
  • Removable Memory
  • Summary
  • Assessment
  • References
5

Acquiring Evidence in a Computer Forensics Lab

  • Introduction
  • Lab Requirements
  • Private Sector Computer Forensics Laboratories
  • Computer Forensics Laboratory Requirements
  • Extracting Evidence from a Device
  • Skimmers
  • Summary
  • Assessment
6

Online Investigations

  • Introduction
  • Working Undercover
  • Website Evidence
  • Background Searches on a Suspect
  • Online Crime
  • Capturing Online Communications
  • Summary
  • Assessment
7

Documenting the Investigation

  • Introduction
  • Obtaining Evidence from a Service Provider
  • Documenting a Crime Scene
  • Seizing Evidence
  • Documenting the Evidence
  • Using Tools to Document an Investigation
  • Writing Reports
  • Using Expert Witnesses at Trial
  • Summary
  • Assessment
8

Admissibility of Digital Evidence

  • Introduction
  • History and Structure of the United States Legal System
  • Evidence Admissibility
  • Constitutional Law
  • When Computer Forensics Goes Wrong
  • Structure of the Legal System in the European Union (E.U.)
  • Structure of the Legal System in Asia
  • Summary
  • Assessment
9

Network Forensics

  • Introduction
  • The Tools of the Trade
  • Networking Devices
  • Understanding the OSI Model
  • Advanced Persistent Threats
  • Investigating a Network Attack
  • Summary
  • Assessment
10

Mobile Forensics

  • Introduction
  • The Cellular Network
  • Handset Specifications
  • Mobile Operating Systems
  • Standard Operating Procedures for Handling Handset Evidence
  • Handset Forensics
  • Manual Cellphone Examinations
  • Global Satellite Service Providers
  • Legal Considerations
  • Other Mobile Devices
  • Summary
  • Assessment
11

Photograph Forensics

  • Introduction
  • Understanding Digital Photography
  • Examining Picture Files
  • Evidence Admissibility
  • Case Studies
  • Summary
  • Assessment
12

Mac Forensics

  • Introduction
  • A Brief History
  • Macintosh File Systems
  • Forensic Examinations of a Mac
  • Macintosh Operating Systems
  • Apple Mobile Devices
  • Case Studies
  • Summary
  • Assessment
13

Case Studies

  • Introduction
  • Zacharias Moussaoui
  • BTK (Bind Torture Kill) Killer
  • Cyberbullying
  • Sports
  • Summary
  • Assessment
  • Assessment of Cases by Judges

1

Windows Operating and File Systems

  • Using a Hex Editor
  • Using FTK Imager
  • Exploring Windows File Registry
  • Using the Disk Defragmenter
  • Using Event Viewer
2

Handling Computer Hardware

  • Reading the Contents of a Secure Digital Card
3

Acquiring Evidence in a Computer Forensics Lab

  • Imaging RAM using FTK Imager
4

Online Investigations

  • Using a Numeric IP Address to Locate a Web Server
  • Printing the Screen Using MAC
5

Mobile Forensics

  • Locating Local Cell Towers and Antennae
  • Viewing the IMEI through the keypad
  • Identifying the Features of a Cellular Phone
6

Mac Forensics

  • Converting Epoch Time
  • Working in the Terminal window

Why Do Learners Love This Course?

The inclusion of flashcards makes it easy for memorizing terms and the labs also ensure that the analyst has a practical touch of the forensics process. The quizzes, pre-assessment and post-assessment questions ensure that your knowledge is well tested.

Chidi Obum, CCNA Cyber Ops
Asst. Manager

The computer forensic course is cut out for those who work for the law enforcement or private forensics entity. It comes with well-sorted topics, performance-based labs, and test questions to reinforce the understanding.

Jon Chan
IT Operation Manager

A Practical Guide to Computer Forensics Investigations

$ 279.99

Buy Now
scroll to top