Computer Forensic Course
Digital Forensic 5 Days Course Catalogue
DAY ONE
- Intro to Computer Forensics
- Interacting With Attorney’s & Clients
- Understanding the Role of an Expert Witness
- Electronic Discovery & Electronically Stored Information
- Ethics in Computer Forensics
- The Business of Computer Forensics
- Building a Forensic Lab
- The Forensic Process
- Anti-Forensics
- Forensic Image vs Backup
- Importance of Chain of Custody
- Documenting the Forensic Acquisition
- Understanding Write-Blockers
- Intro to Forensic Acquisition
- Types of Forensic Images
- Intro to Forensic Analysis
- Authoring Forensic Reports
DAY TWO
The Operating System
- Understanding the Windows Operating System
- Understanding the Windows Registry
The Operating System
- Anatomy of a Hard Drive
- How Data is Stored on the Media
- How Data is Written to the Media
- How Data is Read from the Media
The File System:
- Understanding Files & File Signatures
- Understanding Compound Files
- Understanding Allocated Space of the Hard Drive
- Understanding Unallocated Space of the Hard Drive
- Understanding File Slack
- Understanding File Extensions to Identify Files (Mail, Docs, Spreadsheets)
- Understanding Meta Data
- Understanding EXIF Data
Forensic Tools
- Forensic Workstation Utility
- RIMTECH
- Encase Overview
- Forensic Tool Kit Overview
- Internet Evidence Finder Overview
- Discovery Attender
Understanding Cell Phone Technology
- Cellebrite Overview
- IEF Imager Overview
DAY THREE
Intro to Computer Forensics
- Understanding Forensic Images
- Understanding Forensic Image Types
- Imaging vs Preview
- Creating a Forensic Image of a Windows Installed Hard Drive Using Encase
- Creating a New Case & Adding the Forensic Image to Encase
- Creating a Forensic Image of a Windows Installed Hard Drive Using Forensic Tool Kit
- Creating a New Case & Adding the Forensic Image to the Forensic Tool Kit
- Creating a Forensic Image of a Windows Installed Hard Drive Using Raptor
- Restoring an Image to a Hard Drive
- Searching for & Reviewing Graphic Images in Encase
- Creating a Forensic Image of a Windows Installed RAID5
- Creating a New Case & Adding the RAID5 Forensic Image to Encase
- Creating a Forensic Image of a Windows Installed Encrypted Hard Drive
- Creating a Forensic Image of an MAC OS Installed Hard Drive Using Macquisition
- Creating a Forensic Image of an IOS Device
- Creating a Forensic Image of Cell Phones
DAY FOUR
Overview of the Encase Forensic Software
- Reviewing Files & Placing Them in Order Based on Single or Multiple Keys
- Exporting Evidential Files Out of the Forensic Image
- Understanding & Applying Filters
- Mounting Files
- Recovering Lost Folders
- Analyzing File Signatures
- Searching Allocated & Unallocated Space
- Searching for & Recovering Graphic Images in the Unallocated Space
- Understanding the USBStor
- Understanding & Running Enscripts
- Understanding & Running Case Processor
DAY FIVE
Cellebrite
- Creating A Case
- Searching & Reviewing
- Creating Reports
Internet Evidence Finder
- Creating A Case
- Searching & Reviewing
- Creating Reports
Encase Forensic Analysis Continued
- Bookmarking Relevant Information
- Exporting Booked Marked Items
- Understanding & Finding File Shredding Signatures
- Creating & Exporting Encase Reports
Written Test
Practical Test
This course will be HANDS ON LABS. We will provide you with tools software and lots of exercises scenario to identify the evidence.
Benefit for this course
- – After completing this course and PASS the written Test and Practical Test you will be certified as the Certified Computer Forensic Technician.
- – Exam PASS guarantee
- – Upon successful completion of the course, you will automatically grant the FREE membership for HTCN(HighTech Crime Network) group. PLUS, a FREE Book of Ransomware and Network Intrusions.
Who should attend this course?
- – All law enforcement officers
- – All attorneys (Prosecutors and Defense Attorneys)
- – Private sector professionals engaged in digital forensics (Plaintiff and Defense)
- – Private sector professionals engaged in digital investigations (Plaintiff and Defense)
- – College students who are part of a digital forensics’ degree program
- – College students who are part of a computer science related degree program