A Practical Guide to Computer Forensics Investigations

(comp-forensic) / ISBN : 978-1-61691-042-6
Lessons
Lab
TestPrep
Video Lessons (Add-on)
161 Reviews
Get A Free Trial

Skills You’ll Get

1

Introduction

2

The Scope of Computer Forensics

  • Introduction
  • Types of Computer Forensics Evidence Recovered
  • What Skills Must a Computer Forensics Investigator Possess?
  • The Importance of Computer Forensics
  • A History of Computer Forensics
  • Training and Education
  • Summary
  • Assessment
3

Windows Operating and File Systems

  • Introduction
  • Physical and Logical Storage
  • File Conversion and Numbering Formats
  • Operating Systems
  • Windows Registry
  • Microsoft Windows Features
  • Summary
  • Assessment
4

Handling Computer Hardware

  • Introduction
  • Hard Disk Drives
  • Cloning a PATA or SATA Hard Disk
  • Removable Memory
  • Summary
  • Assessment
  • References
5

Acquiring Evidence in a Computer Forensics Lab

  • Introduction
  • Lab Requirements
  • Private Sector Computer Forensics Laboratories
  • Computer Forensics Laboratory Requirements
  • Extracting Evidence from a Device
  • Skimmers
  • Summary
  • Assessment
6

Online Investigations

  • Introduction
  • Working Undercover
  • Website Evidence
  • Background Searches on a Suspect
  • Online Crime
  • Capturing Online Communications
  • Summary
  • Assessment
7

Documenting the Investigation

  • Introduction
  • Obtaining Evidence from a Service Provider
  • Documenting a Crime Scene
  • Seizing Evidence
  • Documenting the Evidence
  • Using Tools to Document an Investigation
  • Writing Reports
  • Using Expert Witnesses at Trial
  • Summary
  • Assessment
8

Admissibility of Digital Evidence

  • Introduction
  • History and Structure of the United States Legal System
  • Evidence Admissibility
  • Constitutional Law
  • When Computer Forensics Goes Wrong
  • Structure of the Legal System in the European Union (E.U.)
  • Structure of the Legal System in Asia
  • Summary
  • Assessment
9

Network Forensics

  • Introduction
  • The Tools of the Trade
  • Networking Devices
  • Understanding the OSI Model
  • Advanced Persistent Threats
  • Investigating a Network Attack
  • Summary
  • Assessment
10

Mobile Forensics

  • Introduction
  • The Cellular Network
  • Handset Specifications
  • Mobile Operating Systems
  • Standard Operating Procedures for Handling Handset Evidence
  • Handset Forensics
  • Manual Cellphone Examinations
  • Global Satellite Service Providers
  • Legal Considerations
  • Other Mobile Devices
  • Summary
  • Assessment
11

Photograph Forensics

  • Introduction
  • Understanding Digital Photography
  • Examining Picture Files
  • Evidence Admissibility
  • Case Studies
  • Summary
  • Assessment
12

Mac Forensics

  • Introduction
  • A Brief History
  • Macintosh File Systems
  • Forensic Examinations of a Mac
  • Macintosh Operating Systems
  • Apple Mobile Devices
  • Case Studies
  • Summary
  • Assessment
13

Case Studies

  • Introduction
  • Zacharias Moussaoui
  • BTK (Bind Torture Kill) Killer
  • Cyberbullying
  • Sports
  • Summary
  • Assessment
  • Assessment of Cases by Judges

1

Windows Operating and File Systems

  • Using a Hex Editor
  • Using FTK Imager
  • Exploring Windows File Registry
  • Using the Disk Defragmenter
  • Using Event Viewer
2

Handling Computer Hardware

  • Reading the Contents of a Secure Digital Card
3

Acquiring Evidence in a Computer Forensics Lab

  • Imaging RAM using FTK Imager
4

Online Investigations

  • Using a Numeric IP Address to Locate a Web Server
  • Printing the Screen Using MAC
5

Mobile Forensics

  • Locating Local Cell Towers and Antennae
  • Viewing the IMEI through the keypad
6

Mac Forensics

  • Converting Epoch Time
  • Working in the Terminal window

A Practical Guide to Computer Forensics Investigations

$279.99

Buy Now
scroll to top