A Practical Guide to Digital Forensics Investigations
Get to know about digital forensics with the A Practical Guide to Digital Forensics Investigations course and lab. The lab is cloud-based, device-enabled, and can easily be integrated with an LMS. The computer forensics training course and lab provide complete coverage of both technical and investigative skills. The study guide also covers modern devices, networks, and the Internet Addresses online and lab investigations; documentation, admissibility, and more.
- Price: $279.99
- Delivery method: eLearning
- DIR Discount: 20%
Submit form to obtain discount
Test Prep
141+ Pre Assessment Questions |
142+ Post Assessment Questions |
Features
42+ LiveLab |
42+ Video tutorials |
36+ Minutes
Why choose TOPTALENT?
- Get assistance every step of the way from our Texas-based team, ensuring your training experience is hassle-free and aligned with your goals.
- Access an expansive range of over 3,000 training courses with a strong focus on Information Technology, Business Applications, and Leadership Development.
- Have confidence in an exceptional 95% approval rating from our students, reflecting outstanding satisfaction with our course content, program support, and overall customer service.
- Benefit from being taught by Professionally Certified Instructors with expertise in their fields and a strong commitment to making sure you learn and succeed.
Outline
Lessons 1:
Introduction
Lessons 2:
The Scope of Digital Forensics
- Popular Myths about Computer Forensics
- Types of Digital Forensic Evidence Recovered
- What Skills Must a Digital Forensics Investigator Possess?
- The Importance of Digital Forensics
- Job Opportunities
- A History of Digital Forensics
- Training and Education
- Summary
Lessons 3:
Windows Operating and File Systems
- Physical and Logical Storage
- Paging
- File Conversion and Numbering Formats
- Operating Systems
- Windows Registry
- Microsoft Office
- Microsoft Windows Features
- Summary
Lessons 4:
Handling Computer Hardware
- Hard Disk Drives
- Cloning a PATA or SATA Hard Disk
- Removable Memory
- Summary
- Reference
Lessons 5:
Acquiring Evidence in a Computer Forensics Lab
- Lab Requirements
- Private-Sector Computer Forensics Laboratories
- Computer Forensics Laboratory Requirements
- Extracting Evidence from a Device
- Skimmers
- Steganography
- Summary
Lessons 6:
Online Investigations
- Working Undercover
- Dark Web Investigations
- Virtual Currencies
- Website Evidence
- Background Searches on a Suspect
- Online Crime
- Capturing Online Communications
- Edge Web Browser
- Summary
Lessons 7:
Documenting the Investigation
- Obtaining Evidence from a Service Provider
- Documenting a Crime Scene
- Seizing Evidence
- Documenting the Evidence
- Using Tools to Document an Investigation
- Writing Reports
- Using Expert Witnesses at Trial
- Summary
Lessons 8:
Admissibility of Digital Evidence
- History and Structure of the United States Legal System
- Evidence Admissibility
- Constitutional Law
- When Computer Forensics Goes Wrong
- Structure of the Legal System in the European Union (E.U.)
- Privacy Legislation in Asia
- Summary
Lessons 9:
Network Forensics and Incident Response
- The Tools of the Trade
- Networking Devices
- Understanding the OSI Model
- Introduction to VoIP
- Incident Response (IR)
- STIX, TAXII, and Cybox
- Advanced Persistent Threats
- Investigating a Network Attack
- Summary
Lessons 10:
Mobile Forensics
- The Cellular Network
- Handset Specifications
- Mobile Operating Systems
- Standard Operating Procedures for Handling Handset Evidence
- Handset Forensics
- Manual Cellphone Examinations
- Global Satellite Service Providers
- Legal Considerations
- Other Mobile Devices
- Documenting the Investigation
- Summary
Lessons 11:
Mobile App Investigations
- Static Versus Dynamic Analysis
- Dating Apps
- Rideshare Apps
- Communication Apps
- Summary
Lessons 12:
Photograph Forensics
- National Center for Missing and Exploited Children (NCMEC)
- Project VIC
- Case Studies
- Understanding Digital Photography
- Examining Picture Files
- Evidence Admissibility
- Case Studies
- Summary
Lessons 13:
Mac Forensics
- A Brief History
- Apple Wi-Fi Devices
- Macintosh File Systems
- Macintosh Operating Systems
- Apple Mobile Devices
- Performing a Mac Forensics Examination
- Case Studies
- Summary
Lessons 14:
Case Studies
- Silk Road
- Las Vegas Massacre
- Zacharias Moussaoui
- BTK (Bind Torture Kill) Serial Killer
- Cyberbullying
- Sports
- Summary
Lessons 15:
Internet of Things (IoT) Forensics and Emergent Technologies
- 5G
- Wi-Fi 6
- Wi-Fi Mesh Networks
- Shodan
- Mirai Botnet
- Cryptocurrency Mining
- Alexa
- Micro-Chipping
- Fitness Trackers
- Apple Watch
- Action Cameras
- Police Safety
- Police Vehicles
- Vehicle Forensics
- Low-Tech Solution for High-Tech Seizures
- Summary