A Practical Guide to Digital Forensics Investigations

(DIG-FORENSICS.AB2) / ISBN : 978-1-64459-601-2
This course includes
Interactive Lessons
Gamified TestPrep
Hands-On Labs
AI Tutor (Add-on)
Get A Free Trial

About This Course

Skills You’ll Get

1

Introduction

2

The Scope of Digital Forensics

  • Popular Myths about Computer Forensics
  • Types of Digital Forensic Evidence Recovered
  • What Skills Must a Digital Forensics Investigator Possess?
  • The Importance of Digital Forensics
  • Job Opportunities
  • A History of Digital Forensics
  • Training and Education
  • Summary
3

Windows Operating and File Systems

  • Physical and Logical Storage
  • Paging
  • File Conversion and Numbering Formats
  • Operating Systems
  • Windows Registry
  • Microsoft Office
  • Microsoft Windows Features
  • Summary
4

Handling Computer Hardware

  • Hard Disk Drives
  • Cloning a PATA or SATA Hard Disk
  • Removable Memory
  • Summary
  • Reference
5

Acquiring Evidence in a Computer Forensics Lab

  • Lab Requirements
  • Private-Sector Computer Forensics Laboratories
  • Computer Forensics Laboratory Requirements
  • Extracting Evidence from a Device
  • Skimmers
  • Steganography
  • Summary
6

Online Investigations

  • Working Undercover
  • Dark Web Investigations
  • Virtual Currencies
  • Website Evidence
  • Background Searches on a Suspect
  • Online Crime
  • Capturing Online Communications
  • Edge Web Browser
  • Summary
7

Documenting the Investigation

  • Obtaining Evidence from a Service Provider
  • Documenting a Crime Scene
  • Seizing Evidence
  • Documenting the Evidence
  • Using Tools to Document an Investigation
  • Writing Reports
  • Using Expert Witnesses at Trial
  • Summary
8

Admissibility of Digital Evidence

  • History and Structure of the United States Legal System
  • Evidence Admissibility
  • Constitutional Law
  • When Computer Forensics Goes Wrong
  • Structure of the Legal System in the European Union (E.U.)
  • Privacy Legislation in Asia
  • Summary
9

Network Forensics and Incident Response

  • The Tools of the Trade
  • Networking Devices
  • Understanding the OSI Model
  • Introduction to VoIP
  • Incident Response (IR)
  • STIX, TAXII, and Cybox
  • Advanced Persistent Threats
  • Investigating a Network Attack
  • Summary
10

Mobile Forensics

  • The Cellular Network
  • Handset Specifications
  • Mobile Operating Systems
  • Standard Operating Procedures for Handling Handset Evidence
  • Handset Forensics
  • Manual Cellphone Examinations
  • Global Satellite Service Providers
  • Legal Considerations
  • Other Mobile Devices
  • Documenting the Investigation
  • Summary
11

Mobile App Investigations

  • Static Versus Dynamic Analysis
  • Dating Apps
  • Rideshare Apps
  • Communication Apps
  • Summary
12

Photograph Forensics

  • National Center for Missing and Exploited Children (NCMEC)
  • Project VIC
  • Case Studies
  • Understanding Digital Photography
  • Examining Picture Files
  • Evidence Admissibility
  • Case Studies
  • Summary
13

Mac Forensics

  • A Brief History
  • Apple Wi-Fi Devices
  • Macintosh File Systems
  • Macintosh Operating Systems
  • Apple Mobile Devices
  • Performing a Mac Forensics Examination
  • Case Studies
  • Summary
14

Case Studies

  • Silk Road
  • Las Vegas Massacre
  • Zacharias Moussaoui
  • BTK (Bind Torture Kill) Serial Killer
  • Cyberbullying
  • Sports
  • Summary
15

Internet of Things (IoT) Forensics and Emergent Technologies

  • 5G
  • Wi-Fi 6
  • Wi-Fi Mesh Networks
  • Shodan
  • Mirai Botnet
  • Cryptocurrency Mining
  • Alexa
  • Micro-Chipping
  • Fitness Trackers
  • Apple Watch
  • Action Cameras
  • Police Safety
  • Police Vehicles
  • Vehicle Forensics
  • Low-Tech Solution for High-Tech Seizures
  • Summary

1

The Scope of Digital Forensics

  • Displaying Metadata Information
2

Windows Operating and File Systems

  • Enabling the Peek Performance Option
  • Using a Hex Editor
  • Viewing the BIOS
  • Converting an NTFS Partition to FAT32 Using Disk Management
  • Converting a FAT32 Partition to NTFS Using Command Prompt
  • Converting a FAT32 Partition to NTFS Using Disk Management
  • Using FTK Imager
  • Exploring Windows File Registry
  • Using the Event Viewer
  • Using the Disk Defragmenter
3

Handling Computer Hardware

  • Installing an Optical Drive and a PCI Sound Card
  • Supplying Power to a SATA Drive
  • Installing Expansion Cards on a Motherboard
  • Installing a USB 3.0 PCI Express Card (2.0 x4)
  • Sanitizing and Cloning Hard Drives Using Disk Jockey PRO
  • Verifying RAM Usage
  • Reading the Contents of a Secure Digital Card
  • Installing FireWire Cards
4

Acquiring Evidence in a Computer Forensics Lab

  • Imaging a USB Drive Using FTK Imager
  • Using GREP
  • Using the dd Utility
5

Online Investigations

  • Using MBSA
  • Using a Numeric IP Address to Locate a Web Server
  • Making Screen Captures
  • Viewing the Contents of index.dat
6

Network Forensics and Incident Response

  • Analyzing Traffic Captured from Site Survey Software
  • Using NetWitness Investigator
  • Capturing Packets Using Wireshark
  • Using TCPdump
  • Finding a MAC Address of a System
  • Using the tracert Command
  • Getting Information about DNS (Layer 4)
  • Obtaining Information about the Net Firewall Profile
  • Obtaining IP Route Information from the IP Routing Table
  • Obtaining Information about an IP Version
  • Obtaining an IP version of a Network Adapter
  • Getting Information about UDP Ports
  • Getting Information about the Current Connection Statistics of UDP
  • Getting Settings of UDP
  • Getting Information about TCP Ports
  • Getting Information about the Current Connection Statistics of TCP
  • Getting the Settings of TCP
7

Mobile Forensics

  • Locating Local Cell Towers and Antennae Using AntennaSearch
  • Locating the IMEI Number of a Cellphone Using the Keypad
  • Removing an Email Account in Android
  • Configuring an Email Account in Android
  • Setting Up a VPN in Android
  • Retrieving Device Information Using FCC ID
8

Mac Forensics

  • Working in the Terminal Window on a Mac
  • Converting an Epoch Time on a Mac
  • Turning on the Airplane Mode and Viewing the iOS Version of an iPhone
9

Internet of Things (IoT) Forensics and Emergent Technologies

  • Using Shodan

A Practical Guide to Digital Forensics Investigations

$ 418.89

Buy Now

Related Courses

All Course
scroll to top