Module 1 Introduction
Unit 1 01 - Introduction  
Module 2 Computer Forensics in Todays World
Unit 1 01 - Computer Forensics in Todays World  
Unit 2 02 - Forensics Science  
Unit 3 03 - Forensics Readiness  
Unit 4 04 - Cyber Crime  
Unit 5 05 - Cyber Crime Investigation  
Unit 6 06 - Cyber Crime Investigation 02  
Unit 7 07 - Corporate Investigations  
Unit 8 08 - Reporting a Cyber Crime  
Unit 9 09 - Close  
Module 3 Computer Forensics Investigation Process
Unit 1 01 - Computer Forensics Investigation Process  
Unit 2 02 - Before the Investigation  
Unit 3 03 - Build a Forensics Workstation  
Unit 4 04 - Building the Investigation Team  
Unit 5 05 - Acquire Authorisation  
Unit 6 06 - Obtain Search Warrant  
Unit 7 07 - First Responder  
Unit 8 08 - Collect Physical Evidence  
Unit 9 09 - Collect Electronic Evidence  
Unit 10 10 - Secure the Evidence  
Unit 11 11 - Chain of Custody  
Unit 12 12 - Imaging  
Unit 13 13 - Data Analysis  
Unit 14 14 - Investigation Report  
Unit 15 15 - Expert Witness  
Unit 16 16 - Professional Conduct  
Unit 17 17 - Close  
Module 4 Digital Evidence
Unit 1 01 - Digital Evidence  
Unit 2 02 - Increasing Awareness  
Unit 3 03 - Increasing Awareness 02  
Unit 4 04 - Anti-Digital Forensics  
Unit 5 05 - Digital Data  
Unit 6 06 - Rules of Evidence  
Unit 7 07 - International Organisation on Computer Evidence  
Unit 8 08 - Electronic Devices  
Unit 9 09 - Examination Process  
Unit 10 10 - Evidence Assessment  
Unit 11 11 - Evidence Acquisition  
Unit 12 12 - Evidence Acquisition 02  
Unit 13 13 - Evidence Acquisition 03  
Unit 14 14 - Evidence Preservation  
Unit 15 15 - Evidence Examination and Analysis  
Unit 16 16 - Evidence Documentation and Reporting  
Unit 17 17 - Close  
Module 5 First Responder Procedures
Unit 1 01 - First Responder Procedures  
Unit 2 02 - Electronic Evidence  
Unit 3 03 - Roles of First Responder  
Unit 4 04 - Evidence Collecting  
Unit 5 05 - Initial Search  
Unit 6 06 - Collecting and Preserving Electronic Evidence  
Unit 7 07 - Collecting and Preserving Electronic Evidence 02  
Unit 8 08 - Common Mistakes  
Unit 9 09 - Close  
Module 6 Computer Forensics Lab
Unit 1 01 - Computer Forensics Lab  
Unit 2 02 - Planning for a Forensics Lab  
Unit 3 03 - Licensing  
Unit 4 04 - Investigative Services  
Unit 5 05 - Equipment  
Unit 6 06 - Software  
Unit 7 07 - Close  
Module 7 Understanding Hard Disks and File Systems
Unit 1 01 - Understanding Hard Disks and File Systems  
Unit 2 02 - Disk Drives  
Unit 3 03 - Cluster  
Unit 4 04 - Slack Space  
Unit 5 05 - Disk Partitions  
Unit 6 06 - Master Boot Record  
Unit 7 07 - Boot Process  
Unit 8 08 - File Systems  
Unit 9 09 - Windows File Systems  
Unit 10 10 - Linux File Systems  
Unit 11 11 - Mac OS X File Systems  
Unit 12 12 - RAID Storage System  
Unit 13 13 - File Carving Process  
Unit 14 14 - Close  
Module 8 Windows Forensics
Unit 1 01 - Windows Forensics  
Unit 2 02 - Volatile Information  
Unit 3 03 - System Time  
Unit 4 04 - Network Information  
Unit 5 05 - Process Memory  
Unit 6 06 - Non-Volatile Information  
Unit 7 07 - Slack Space Continued  
Unit 8 08 - Collecting Hidden Partition Information  
Unit 9 09 - Memory Dump  
Unit 10 10 - Extracting the Process Image  
Unit 11 11 - Inside the Registry  
Unit 12 12 - Time Zone Information  
Unit 13 13 - Wireless SSIDs  
Unit 14 14 - Mounted Devices  
Unit 15 15 - Cache, Cookie and History Analysis in IE  
Unit 16 16 - MD5  
Unit 17 17 - Recycle Bin  
Unit 18 18 - Prefetch Files  
Unit 19 19 - Executable File Analysis  
Unit 20 20 - PE Header Analysis  
Unit 21 21 - Metadata  
Unit 22 22 - Events  
Unit 23 23 - Windows Password Storage  
Unit 24 24 - Windows Forensics Tool  
Unit 25 25 - Close  
Module 9 Data Acquisition and Duplication
Unit 1 01 - Data Acquisition and Duplication  
Unit 2 02 - Formats  
Unit 3 03 - Methods  
Unit 4 04 - Mistakes  
Unit 5 05 - Static Data  
Unit 6 06 - Live Data  
Unit 7 07 - Disk Imaging Tool Requirements  
Unit 8 08 - Validating Data Acquisitions  
Unit 9 09 - Remote Data Acquisitions  
Unit 10 10 - Best Practices  
Unit 11 11 - Close  
Module 10 Recovering Deleted Files and Deleted Partitions
Unit 1 01 - Recovering Deleted Files and Deleted Partitions  
Unit 2 02 - Deleting Files  
Unit 3 03 - Recycle Bin Continued  
Unit 4 04 - File Recovery in Mac OS X  
Unit 5 05 - File Recovery in Linux  
Unit 6 06 - Close  
Module 11 Using AccessData FTK 02
Unit 1 01 - Using AccessData FTK  
Unit 2 02 - Using AccessData FTK 02  
Module 12 Steganography and Image File Forensics
Unit 1 01 - Steganography and Image File Forensics  
Unit 2 02 - What is Steganography  
Unit 3 03 - Steganography Techniques  
Unit 4 04 - Steganography Techniques 02  
Unit 5 05 - Steganalysis  
Unit 6 06 - Close  
Module 13 Application Password Crackers
Unit 1 01 - Application Password Crackers  
Unit 2 02 - Terminology  
Unit 3 03 - Password Cracker  
Unit 4 04 - Password Cracking Techniques  
Unit 5 05 - Active Online Attack  
Unit 6 06 - Non-Electronic Attacks  
Unit 7 07 - System Software Password Cracking  
Unit 8 08 - Close  
Module 14 Log Capturing and Event Correlation
Unit 1 01 - Log Capturing and Event Correlation  
Unit 2 02 - Computer Security Logs  
Unit 3 03 - Router Log Files  
Unit 4 04 - Configuring Windows Logging  
Unit 5 05 - Log File Accuracy  
Unit 6 06 - Keeping Time  
Unit 7 07 - UTC Time  
Unit 8 08 - Legality of Using Logs  
Unit 9 09 - Laws and Regulations  
Unit 10 10 - Log Management  
Unit 11 11 - Centralised Logging  
Unit 12 12 - Syslog  
Unit 13 13 - Event Correlation  
Unit 14 14 - Close  
Module 15 Network Forensics and Investigating Network Traffic
Unit 1 01 - Network Forensics and Investigating Network Traffic  
Unit 2 02 - Intrusion Detection Systems  
Unit 3 03 - IP Address Spoofing  
Unit 4 04 - Denial of Service  
Unit 5 05 - Trojan Horse  
Unit 6 06 - Injection Attacks  
Unit 7 07 - Postmortem and Real Time Analysis  
Unit 8 08 - Close  
Module 16 Investigating Wireless Attacks
Unit 1 01 - Investigating Wireless Attacks  
Unit 2 02 - Wireless Standards  
Unit 3 03 - Service Set Identifier  
Unit 4 04 - Types of Wireless Encryption  
Unit 5 05 - Wi-Fi Chalking  
Unit 6 06 - Availibility Attacks  
Unit 7 07 - Identify Wireless Devices at Crime Scene  
Unit 8 08 - Features of a Good Wireless Fornensics Tool  
Unit 9 09 - Close  
Module 17 Investigating Web Attacks
Unit 1 01 - Investigating Web Attacks  
Unit 2 02 - Introduction To Web Applications  
Unit 3 03 - Web Attacks  
Unit 4 04 - Unvalidated Input  
Unit 5 05 - Parameter_Form Tampering  
Unit 6 06 - Injection Flaws  
Unit 7 07 - SQL Injection Attacks  
Unit 8 08 - Cross-Site Scripting  
Unit 9 09 - Improper Error Handling  
Unit 10 10 - Web Attack Investigation  
Unit 11 11 - Investigating Cross-Site Scripting  
Unit 12 12 - Investigating SQL Injection Attacks  
Unit 13 13 - Close  
Module 18 Tracking Emails and Investigating Email Crimes
Unit 1 01 - Tracking Emails and Investigating Email Crimes  
Unit 2 02 - SMTP Server  
Unit 3 03 - POP3 and IMAP Servers  
Unit 4 04 - E-mail Messgae  
Unit 5 05 - Investigating E-mail Crime and Violations  
Unit 6 06 - Examine E-mail Headers  
Unit 7 07 - Analysing E-mail Headers  
Unit 8 08 - Examining Additional Files  
Unit 9 09 - Forensic Acquisition of E-mail Archive  
Unit 10 10 - Deleted E-mail Recovery  
Unit 11 11 - Forensic Tool Kit  
Unit 12 12 - CAN-SPAM Act  
Unit 13 13 - Close  
Module 19 Mobile Forensics
Unit 1 01 - Mobile Forensics  
Unit 2 02 - Mobile Phone  
Unit 3 03 - Mobile Phone Forensics  
Unit 4 04 - Precautions to Be Taken Before Investigation  
Unit 5 05 - Mobile Devices  
Unit 6 06 - Close  
Module 20 Investigative Reports
Unit 1 01 - Investigative Reports  
Unit 2 02 - Computer Forensics Report  
Unit 3 03 - Features of a Good Report  
Unit 4 04 - Computer Forensics Report Template  
Unit 5 05 - Report Classification  
Unit 6 06 - Attachments and Appendices  
Unit 7 07 - Writing a Report Using FTK  
Unit 8 08 - Close  
Module 21 Becoming an Expert Witness
Unit 1 01 - Becoming an Expert Witness  
Unit 2 02 - What is an Expert Witness  
Unit 3 03 - Technical vs. Expert Witness  
Unit 4 04 - Preparing for Testimony  
Unit 5 05 - Expert Witness Qualifications  
Unit 6 06 - Importance of Resume  
Unit 7 07 - Testifying in Court  
Unit 8 08 - General Ethics  
Unit 9 09 - Helping Your Attorney  
Unit 10 10 - Deposing  
Unit 11 11 - Dealing with Media  
Unit 12 12 - Close  
Module 22 Lab Introduction
Unit 1 01 - Lab Introduction  
Unit 2 02 - Imaging with FTK Device  
Unit 3 03 - Steganography Detection  
Unit 4 04 - Network Attacks Network Miner and Wireshark  
Unit 5 05 - Acquiring Memory Images  
Powered By WP Courseware