Course Outline
Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacker through a client’s systems, to tracing the originator of defamatory emails, to recovering signs of fraud.
Module 1: Introduction
Module 2: Computer Forensic Incidents
Module 3: Investigation Process
Module 4: Disk Storage Concepts
Module 5: Digital Acquisition & Analysis
Module 6: Forensic Examination Protocols
Module 7: Digital Evidence Protocols
Module 8: CFI Theory
Module 9: Digital Evidence Presentation
Module 10: Computer Forensic Laboratory Protocols
Module 11: Computer Forensic Processing Techniques
Module 12: Digital Forensics Reporting
Module 13: Specialized Artifact Recovery
Module 14: e-Discovery and ESI
Module 15: Mobile Device Forensics
Module 16: USB Forensics
Module 17: Incident Handling
Mile2 - Lab 1: Preparing Forensic Workstation
- AccessData FTK Imager Installation
- Autopsy Installation
- National Software Reference Library (NSRL) for autopsy
- 7z Installation
- Install Registry Viewer
- Install Password Recovery Tool Kit (PRTK – 5.21)
Lab 2: Chain of Custody
- Chain of Custody Search and Seizure
- Chain of Custody Forensic Imaging
Lab 3: Imaging Case Evidence / FTK Imager
Lab 4: Create a new case for Autopsy
- Creating a Case in Autopsy
Lab 5: Reviewing Evidence / Autopsy (Case #1)
- User MTBG attempting to hack his/her previous employer
- Reviewing Evidence in Autopsy
Case Study scenario:
- The evidence you are required to discover (Challenge)
Final Report for MTBG case
Lab 6: Reviewing Evidence / Autopsy (Case #2)
- Greg Schardt case
Case Study Scenario:
- The evidence you are required to discover (Challenge)
Testimonials (4)
The trainer was very knowledgable and took time to give a very good insight into cyber security issues. A lot of these examples could be used or modified for our learners and create some very engaging lesson activities.
Jenna - Merthyr College
Course - Fundamentals of Corporate Cyber Warfare
Pentester skills what demonstrate teacher
Oleksii Adamovych - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Ethical Hacker
The instructor has a very wide range of knowledge and is committed to what he does. He is able to interest the listener with his course. The scope of the training fully met my expectations.
Karolina Pfajfer - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - MasterClass Certified Ethical Hacker Program
All is excellent