Scroll to top button
A Practical Guide to Computer Forensics Investigations
(comp-forensic)
/ ISBN: 9781616910426
This course includes
Lessons
TestPrep
LiveLab
Video Lessons (Add-on)
A Practical Guide to Computer Forensics Investigations
Enroll yourself in A Practical Guide to Computer Forensics Investigations course and lab to know about computer forensics investigation. The lab provides a hands-on learning experience in a safe and online environment. The computer forensics training course provides skills on topics such as network, mobile, and photograph forensics, online investigations, and many more. The Computer Forensics course offers hands-on activities, numerous case studies, and practical applications of computer forensic techniques.
Lessons
-
13+ Lessons
-
230+ Quizzes
-
458+ Flashcards
-
458+ Glossary of terms
TestPrep
-
100+ Pre Assessment Questions
-
100+ Post Assessment Questions
LiveLab
-
14+ LiveLab
-
15+ Video tutorials
Video Tutorials (Add-on)
-
90+ Video tutorials
- Introduction
- Types of Computer Forensics Evidence Recovered
- What Skills Must a Computer Forensics Investigator Possess?
- The Importance of Computer Forensics
- A History of Computer Forensics
- Training and Education
- Summary
- Assessment
- Introduction
- Physical and Logical Storage
- File Conversion and Numbering Formats
- Operating Systems
- Windows Registry
- Microsoft Windows Features
- Summary
- Assessment
- Introduction
- Hard Disk Drives
- Cloning a PATA or SATA Hard Disk
- Removable Memory
- Summary
- Assessment
- References
- Introduction
- Lab Requirements
- Private Sector Computer Forensics Laboratories
- Computer Forensics Laboratory Requirements
- Extracting Evidence from a Device
- Skimmers
- Summary
- Assessment
- Introduction
- Working Undercover
- Website Evidence
- Background Searches on a Suspect
- Online Crime
- Capturing Online Communications
- Summary
- Assessment
- Introduction
- Obtaining Evidence from a Service Provider
- Documenting a Crime Scene
- Seizing Evidence
- Documenting the Evidence
- Using Tools to Document an Investigation
- Writing Reports
- Using Expert Witnesses at Trial
- Summary
- Assessment
- Introduction
- History and Structure of the United States Legal System
- Evidence Admissibility
- Constitutional Law
- When Computer Forensics Goes Wrong
- Structure of the Legal System in the European Union (E.U.)
- Structure of the Legal System in Asia
- Summary
- Assessment
- Introduction
- The Tools of the Trade
- Networking Devices
- Understanding the OSI Model
- Advanced Persistent Threats
- Investigating a Network Attack
- Summary
- Assessment
- Introduction
- The Cellular Network
- Handset Specifications
- Mobile Operating Systems
- Standard Operating Procedures for Handling Handset Evidence
- Handset Forensics
- Manual Cellphone Examinations
- Global Satellite Service Providers
- Legal Considerations
- Other Mobile Devices
- Summary
- Assessment
- Introduction
- Understanding Digital Photography
- Examining Picture Files
- Evidence Admissibility
- Case Studies
- Summary
- Assessment
- Introduction
- A Brief History
- Macintosh File Systems
- Forensic Examinations of a Mac
- Macintosh Operating Systems
- Apple Mobile Devices
- Case Studies
- Summary
- Assessment
- Introduction
- Zacharias Moussaoui
- BTK (Bind Torture Kill) Killer
- Cyberbullying
- Sports
- Summary
- Assessment
- Assessment of Cases by Judges
Hands on Activities (Live Labs)
- Using a Hex Editor
- Using FTK Imager
- Exploring Windows File Registry
- Using the Disk Defragmenter
- Using Event Viewer
- Reading the Contents of a Secure Digital Card
- Imaging RAM using FTK Imager
- Using a Numeric IP Address to Locate a Web Server
- Printing the Screen Using MAC
- Locating Local Cell Towers and Antennae
- Viewing the IMEI through the keypad
- Identifying the Features of a Cellular Phone
- Converting Epoch Time
- Working in the Terminal window
Jon Chan
The computer forensic course is cut out for those who work for the law enforcement or private forensics entity. It comes with well-sorted topics, performance-based labs, and test questions to reinforce the understanding.
Chidi Obum, CCNA Cyber Ops
The inclusion of flashcards makes it easy for memorizing terms and the labs also ensure that the analyst has a practical touch of the forensics process. The quizzes, pre-assessment and post-assessment questions ensure that your knowledge is well tested.
Show more
×
Share with your friends and colleagues
We use cookies to enhance your experience. By continuing to visit this site you agree to our use of cookies.
More information
Accept