Computer Forensics JumpStart

Size: px
Start display at page:

Download "Computer Forensics JumpStart"

Transcription

1 Computer Forensics JumpStart Michael G. Solomon Diane Barrett Neil Broom SYBEX

2 Computer Forensics JumpStart Michael G. Solomon Diane Barrett Neil Broom San Francisco London

3 Associate Publisher: Neil Edde Acquisitions and Developmental Editor: Maureen Adams Production Editor: Lori Newman Technical Editor: Warren G. Kruse Copyeditor: Kathy Grider-Carlyle Compositor: Jeff Wilson, Happenstance Type-O-Rama Graphic Illustrator: Jeff Wilson, Happenstance Type-O-Rama Proofreaders: Ian Golder, Amy Rasmussen, Nancy Riddiough Indexer: Nancy Guenther Book Designer: Judy Fung Cover Designer: Richard Miller, Calyx Design Cover Illustrator: Richard Miller, Calyx Design Copyright 2005 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA World rights reserved. No part of this publication may be stored in a retrieval system, transmitted, or reproduced in any way, including but not limited to photocopy, photograph, magnetic, or other record, without the prior agreement and written permission of the publisher. Library of Congress Card Number: ISBN: X SYBEX and the SYBEX logo are either registered trademarks or trademarks of SYBEX Inc. in the United States and/or other countries. JumpStart is a trademark of SYBEX Inc. Screen reproductions produced with FullShot 99. FullShot Inbit Incorporated. All rights reserved. FullShot is a trademark of Inbit Incorporated. Internet screen shot(s) using Microsoft Internet Explorer 6 reprinted by permission from Microsoft Corporation. TRADEMARKS: SYBEX has attempted throughout this book to distinguish proprietary trademarks from descriptive terms by following the capitalization style used by the manufacturer. The author and publisher have made their best efforts to prepare this book, and the content is based upon final release software whenever possible. Portions of the manuscript may be based upon pre-release versions supplied by software manufacturer(s). The author and the publisher make no representation or warranties of any kind with regard to the completeness or accuracy of the contents herein and accept no liability of any kind including but not limited to performance, merchantability, fitness for any particular purpose, or any losses or damages of any kind caused or alleged to be caused directly or indirectly from this book. Manufactured in the United States of America

4 About the Authors Michael G. Solomon is a full-time security speaker, consultant ( trainer, and a former college instructor who specializes in development and assessment security topics. As an IT professional and consultant since 1987, he has worked on projects or trained for more than 60 major companies and organizations, including EarthLink, Nike Corporation, Lucent Technologies, BellSouth, UPS, the U.S. Coast Guard, and Norrell. From 1998 until 2001, Michael was an instructor in the Kennesaw State University s Computer Science and Information Sciences (CSIS) department, where he taught courses on software project management, C++ programming, computer organization and architecture, and data communications. Michael has an M.S. in mathematics and computer science from Emory University (1998) and a B.S. in computer science from Kennesaw State University (1987). Michael has also contributed to various security certification books for LANWrights/iLearning, including TICSA Training Guide and an accompanying Instructor Resource Kit (Que, 2002), CISSP Study Guide (Sybex, 2003), as well as Security+ Training Guide (Que, 2003). Michael co-authored Information Security Illuminated (Jones and Bartlett, 2005), Security+ Lab Manual Exam Cram 2 (Que, 2005), and authored and provided the on-camera delivery of LearnKey s CISSP Prep e-learning course. Michael s certifications include Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), and TruSecure ICSA Certified Security Associate (TICSA). Diane Barrett has been involved in the IT industry since She works at Remington College where she taught in the computer networking program for two years before becoming a director. She teaches online classes that include networking, security, and virus protection, and she is the president of a security awareness corporation that specializes in training. Diane has co-authored several security and networking books, including MCSA/MCSE Exam Cram 2: Implementing and Administering Security in a Windows Server 2003 Network (Que, 2004) and Computer Networking Illuminated (Jones and Bartlett, 2005). She is currently volunteering for ISSA s Generally Accepted Information Security Principles Project in the ethical practices working group. Diane s certifications include Microsoft Certified Systems Engineer (MCSE) on Windows 2000, MCSE+I on Windows NT 4.0, Certified Information Systems Security Professional (CISSP), Cisco Certified Network Associate (CCNA), A+, Network+, i-net+, and Security+. Neil Broom is the President of the Technical Resource Center ( in Atlanta, Georgia. As a speaker, trainer, course director, and consultant in the fields of Computer Forensics, Information Assurance, and Professional Security Testing, he has over 14 years of experience providing technical education and security services to the military, law enforcement, the health care industry, financial institutions, and government agencies. Neil is the Lead Instructor and Developer of the Computer Forensics and Cyber Investigations course and the Certified Cyber Crime Examiner (C 3 E) certification and provides Computer Forensics services to clients in the Metro Atlanta area and the Southeast United States.

5 Neil is currently the Vice President of the Atlanta Chapter of the International Information Systems Forensics Association, and he is a professional member of the National Speakers Association. His past employment includes the U.S. Navy as a submariner, the Gainesville, Florida Police Department as a law enforcement officer, and Internet Security Systems (ISS) as a security trainer. Neil has multiple certifications including Certified Information Systems Security Professional (CISSP), Certified Computer Examiner (CCE), Certified Ethical Hacker (CEH), Computer Hacking Forensic Investigator (CHFI), National Security Agency s INFOSEC Assessment Methodology (IAM), Microsoft Certified Systems Engineer (MCSE 4.0 and 2000), Microsoft Certified Trainer (MCT), and TruSecure ICSA Certified Security Associate (TICSA). About the Technical Editor Warren G. Kruse II, CISSP, CFCE, is the co-author of Computer Forensics: Incident Response Essentials, published by Addison-Wesley. Warren has conducted forensics globally in support of cases involving some of the largest law firms and corporations in the world. He is a member of the New York and European Electronic Crimes Task Forces of the U.S. Secret Service. He was elected President of the High Tech Crime Investigation Association s ( International Executive Committee. Warren has extensive experience investigating cases involving the illegal use of computer and networks and received the High Tech Crime Investigation Association's (HTCIA) 2001 Case of the Year award. He is an IACIS Certified Forensic Computer Examiner (CFCE) and an (ISC) 2 Certified Information Systems Security Professional (CISSP). He lectures on computer forensics for Computer Security Institute (CSI) and has taught computer forensics at the SANS Institute and MIS Training Institute. He is the lead instructor of the handson intro and advanced Computer Forensics Bootcamps for Computer Forensic Services, LLC. Warren is a partner at Computer Forensic Services, LLC (

6 To my wife, best friend, and source of unyielding support, Stacey. Michael G. Solomon To my dad, Gerald, who has always encouraged me to be my own person. Diane Barrett To my mother, thank you for always believing in me. Neil Broom

7 Acknowledgments Anything worth doing is worth doing well, and doing anything well generally requires a lot of help. My family has helped me immensely throughout this project. Stacey, Noah, and Isaac are all great fun to be around and often serve as sounding boards. The one focal point of this book, however, is Kim Lindros at LANWrights/ ilearning. She kept the project on track and worked things out regardless of what curve balls I may have sent her way. Kim deserves a huge ovation for her work to get this book into your hands. I truly appreciate the efforts of all the people at LANWrights/iLearning and Sybex to make this project a reality. Michael G. Solomon Thanks to everyone at Sybex for making this book possible, especially Maureen Adams the acquisitions editor and Lori Newman the production editor. Thank you to the wonderful team at LANWrights/iLearning, especially Kim Lindros, who worked so hard behind the scenes to be sure that our work was accurate and completed in a timely fashion. To co-authors Michael Solomon and Neil Broom, thank you for the part each of you played in making this project successful. Thanks to Warren G. Kruse II, our technical reviewer, for making certain our writing was technically and procedurally sound. Finally, special thanks to my husband, Bill, for keeping a sense of humor during the hours I spent writing. Diane Barrett Kim Lindros, you rock! Thank you for all the support and gentle nudging you provided to keep me writing. I also wish to say thank you to the cat and kitten rescue group that I work with, Now that the book is finished, I can return to helping save the lives of our furry little friends. Neil Broom

8 Contents vii Contents Introduction xvii Chapter 1 The Need for Computer Forensics 1 Defining Computer Forensics Real-Life Examples of Computer Crime Hacker Pleads Guilty to Illegally Accessing New York Times Computer Network Man Pleads Guilty to Hacking Intrusion and Theft of Data Costing Company $5.8 Million Three Men Indicted for Hacking into Lowe s Companies Computers with Intent to Steal Credit Card Information Former Chief Computer Network Program Designer Arraigned for Alleged $10 Million Computer Software Bomb Juvenile Computer Hacker Sentenced to Six Months in Detention Facility Corporate versus Law Enforcement Concerns Corporate Concerns Focus on Detection and Prevention Law Enforcement Focuses on Prosecution Russian Computer Hacker Indicted in California for Breaking into Computer Systems and Extorting Victim Companies Training Practitioners End Users What Are Your Organization s Needs? Terms to Know Review Questions Chapter 2 Preparation What to Do Before You Start 21 Know Your Hardware What I/O Devices Are Used? Check Computers for Unauthorized Hardware Keep Up to Date with New I/O Trends

9 viii Contents Know Your Operating System Different Operating Systems Know What Filesystems Are in Use Maintain Tools and Procedures for Each Operating System and Filesystem Preinstalled Tools Make Forensics Easier Know Your Limits Legal Organizational Rights and Limits Search and Seizure Guidelines Will This End Up in Court? Develop Your Incident Response Team Organize the Team State Clear Processes Coordinate with Local Law Enforcement Terms to Know Review Questions Chapter 3 Computer Evidence 51 What Is Computer Evidence? Incidents and Computer Evidence Types of Evidence Search and Seizure Voluntary Surrender Subpoena Search Warrant Chain of Custody Definition Controls Documentation Evidence Admissibility in a Court of Law Relevance and Admissibility Techniques to Ensure Admissibility Leave No Trace Read-Only Image Software Write Blocker Hardware Write Blocker Terms to Know Review Questions Chapter 4 Common Tasks 73 Evidence Identification Physical Hardware Removable Storage Documents

10 Contents ix Evidence Preservation Pull the Plug or Shut It Down? Supply Power As Needed Provide Evidence of Initial State Evidence Analysis Knowing Where to Look Wading through the Sea of Data Sampling Data Evidence Presentation Know Your Audience Organization of Presentation Keep It Simple Terms to Know Review Questions Chapter 5 Capturing the Data Image 95 Full Volume Images Evidence Collection Order Preparing Media and Tools Collecting the Volatile Data Creating a Duplicate of the Hard Disk Extracting Data from PDAs Image and Tool Documentation Partial Volume Image Imaging/Capture Tools Utilities Commercial Software PDA Tools Terms to Know Review Questions Chapter 6 Extracting Information from Data 117 What Are You Looking For? Internet Files Headers Deleted Files Passwords How People Think Picking the Low-Hanging Fruit Hidden Evidence Trace Evidence Terms to Know Review Questions

11 x Contents Chapter 7 Passwords and Encryption 139 Passwords Finding Passwords Deducing Passwords Cracking Passwords Encryption Basics Common Encryption Practices Private Key Algorithms Public Key Algorithms Steganography Strengths and Weaknesses of Encryption Key Length Key Management Handling Encrypted Data Identifying Encrypted Files Decrypting Files Terms to Know Review Questions Chapter 8 Common Forensics Tools 161 Disk Imaging and Validation Tools ByteBack dd DriveSpy EnCase Forensic Replicator FTK Imager Norton Ghost ProDiscover SafeBack SMART WinHex Forensics Tools Software Suites Miscellaneous Software Tools Hardware Your Forensics Toolkit Each Organization Is Different Most Examiners Use Overlapping Tools Terms to Know Review Questions

12 Contents xi Chapter 9 Pulling It All Together 195 Begin with a Concise Summary Document Everything, Assume Nothing Interviews and Diagrams Videotapes and Photographs Transporting the Evidence Documenting Gathered Evidence Additional Documentation Formulating the Report Sample Analysis Reports Case #234 NextGard Technology Copyright Piracy Summary Additional Report Subsections Using Software to Generate Reports Terms to Know Review Questions Chapter 10 How to Testify in Court 221 Preparation Is Everything Understand the Case Understand the Strategy Understand Your Job Appearance Matters Clothing Grooming Attitude What Matters Is What They Hear Listening Tone Vocabulary Know Your Forensics Process and Tools Best Practices Your Process and Documentation Your Forensic Toolkit Say Only What Is Necessary Be Complete, But Not Overly Elaborate Remember Your Audience Keep It Simple Explaining Technical Concepts Use Presentation Aids When Needed Watch for Feedback Be Ready to Justify Every Step Summary Terms to Know Review Questions

13 xii Contents Appendix A Answers to Review Questions 239 Chapter Chapter Chapter Chapter Chapter Chapter Chapter Chapter Chapter Chapter Appendix B Forensics Resources 249 Information Organizations Publications Services Software Training Appendix C Forensics Certifications 253 Advanced Information Security (AIS) Certified Computer Examiner (CCE) Certified Cyber-Crime Expert (C 3 E) Certified Information Forensics Investigator (CIFI) Certified Computer Crime Investigator (CCCI) Certified Computer Forensic Technician (CCFT) Certified Forensic Computer Examiner (CFCE) Certified Information Systems Auditor (CISA) EnCase Certified Examiner Program GIAC Certified Forensic Analyst (GCFA) Professional Certified Investigator (PCI) Appendix D Forensics Tools 261 Forensics Tool Suites Ultimate Toolkit Maresware X-Ways Forensics Forensicware Password-Cracking Utilities Passware ElcomSoft

14 Contents xiii CD Analysis Utilities IsoBuster CD/DVD Inspector Metadata Viewer Utility Metadata Assistant Graphic Viewing Utility Quick View Plus Forensics Hardware Devices Intelligent Computer Solutions Computer Forensics Training Intense School Computer Forensics Training Class Glossary 267 Index 274

15

Computer Forensics JumpStart. Second Edition

Computer Forensics JumpStart. Second Edition Computer Forensics JumpStart Second Edition Computer Forensics JumpStart Second Edition Michael G. Solomon K Rudolph Ed Tittel Neil Broom Diane Barrett Acquisitions Editor: Agatha Kim Development Editor:

More information

Forensic Certifications

Forensic Certifications Forensic Certifications Mayuri Shakamuri CS 489-02 Digital Forensics October 31, 2006 New Mexico Tech Executive Summary Digital Forensics is rapidly growing and evolving to become a scientific practice

More information

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge

More information

How To Get A Computer Hacking Program

How To Get A Computer Hacking Program CHFI v8(computer Hacking Forensics Investigator) Course Description & Overview Overview CHFIv8 Course Description EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator

More information

EC-Council Ethical Hacking and Countermeasures

EC-Council Ethical Hacking and Countermeasures EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Cyber Security Training & Consulting Certified Digital COURSE OVERVIEW 5 Days 40 CPE Credits $3,000 Digital is the investigation and recovery of data contained in digital devices. This data is often the

More information

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge skills in computer

More information

WILLIAM OETTINGER PHONE (702) 292-4645 [email protected]

WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM WILLIAM OETTINGER PHONE (702) 292-4645 [email protected] SUMMARY OF QUALIFICATIONS Veteran investigator in a traditional and computer-related environment. A leader experienced in organizing, directing,

More information

To Catch a Thief: Computer Forensics in the Classroom

To Catch a Thief: Computer Forensics in the Classroom To Catch a Thief: Computer Forensics in the Classroom Anna Carlin [email protected] Steven S. Curl [email protected] Daniel Manson [email protected] Computer Information Systems Department California

More information

InfoSec Academy Forensics Track

InfoSec Academy Forensics Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

Chapter 7 Securing Information Systems

Chapter 7 Securing Information Systems 1 Chapter 7 Securing Information Systems LEARNING TRACK 3: COMPUTER FORENSICS For thirty years, a serial murderer known as the BTK killer (standing for bind, torture, and kill) remained at large in Wichita,

More information

COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL)

COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL) COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL) COURSE DESCRIPTION: Computer Forensics is focused on teaching

More information

Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065

Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Introduction The Computer Forensics and Investigation course presents methods to properly conduct a computer forensics investigation

More information

CERTIFIED DIGITAL FORENSICS EXAMINER

CERTIFIED DIGITAL FORENSICS EXAMINER CERTIFIED DIGITAL FORENSICS EXAMINER KEY DATA Course Title: C)DFE Duration: 5 days CPE Credits: 40 Class Format Options: Instructor-led classroom Live Online Training Computer Based Training Who Should

More information

Computer Forensics JumpStart Second Edition

Computer Forensics JumpStart Second Edition www.allitebooks.com www.allitebooks.com Computer Forensics JumpStart Second Edition www.allitebooks.com www.allitebooks.com Computer Forensics JumpStart Second Edition Michael G. Solomon K Rudolph Ed Tittel

More information

Computer Hacking Forensic Investigator v8

Computer Hacking Forensic Investigator v8 CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Computer Hacking Forensic Investigator v8 Course Description: EC-Council releases the most advanced Computer

More information

Certification and Training

Certification and Training Certification and Training CSE 4471: Information Security Instructor: Adam C. Champion Autumn Semester 2013 Based on slides by a former student (CSE 551) Outline Organizational information security personnel

More information

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker ALL ElNis ONE CEH Certified Ethical Hacker EXAM GUIDE Matt Walker Mc Grain/ New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto McGraw-Hill

More information

Course Title: Computer Forensic Specialist: Data and Image Files

Course Title: Computer Forensic Specialist: Data and Image Files Course Title: Computer Forensic Specialist: Data and Image Files Page 1 of 9 Course Description The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute

More information

CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner

CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner Binary Intelligence, LLC 150 Industrial Drive Franklin, Ohio 45005 Phone: 866.246.2794 x703 Email: [email protected] CERTIFICATIONS AND

More information

Information Technologies and Fraud

Information Technologies and Fraud Information Technologies and Fraud Florin Gogoasa CISA, CFE, CGEIT, CRISC ACFE Romania - Founder and Board member Managing Partner Blue Lab Consulting Information Technologies for Fraud investigation A.

More information

JAMES R. SWAUGER Digital Forensic Examiner

JAMES R. SWAUGER Digital Forensic Examiner CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner Binary Intelligence, LLC 726 East Main Street, Suite F #150 Lebanon, Ohio 45036 Phone: 866.246.2794 x703 Email: [email protected] CERTIFICATIONS

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student

More information

Scene of the Cybercrime Second Edition. Michael Cross

Scene of the Cybercrime Second Edition. Michael Cross Scene of the Cybercrime Second Edition Michael Cross Chapter 1 Facing the Cybercrime Problem Head-On 1 Introduction 2 Defining Cybercrime 2 Understanding the Importance of Jurisdictional Issues 3 Quantifying

More information

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING MODULE A INTRODUCTION TO COMPUTER FORENSICS AND NVESTIGATIONS A1.0 Explain concepts related to computer forensics. A1.1 This module is measured

More information

IT Security Management 100 Success Secrets

IT Security Management 100 Success Secrets IT Security Management 100 Success Secrets 100 Most Asked Questions: The Missing IT Security Management Control, Plan, Implementation, Evaluation and Maintenance Guide Lance Batten IT Security Management

More information

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com Ultimate Knowledge Institute ultimateknowledge.com Social Media Security Training and Certifications Social Media Security Professional (SMSP) Social Media Engineering & Forensics Professional (SMEFP)

More information

Certified Digital Forensics Examiner (CDFE)

Certified Digital Forensics Examiner (CDFE) Certified Digital Forensics Examiner (CDFE) Secrets To Acing The Exam and Successful Finding And Landing Your Next Certified Digital Forensics Examiner (CDFE) Certified Job 1 2 Write a review to receive

More information

How To Do Digital Forensics

How To Do Digital Forensics Enterprise Risk Management Miami, FL Digital Forensics Risk Management and Information Systems Security Consulting Services January 2011 UMiami alumnus Bachelors: Information Systems and Marketing MS Computer

More information

Computer Security and Investigations

Computer Security and Investigations Computer Security and Investigations Program Locations: Program Code: Coordinator: Credential: Peterborough CSI Blair Brown Ontario College Advanced Diploma Start Dates: September 06, 2016 January 09,

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY-274 Privacy, Ethics & Computer Forensics I. Basic Course Information A. Course Number & Title: CISY-274 - Privacy, Ethics, & Computer Forensics B. New

More information

MARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633

MARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633 MARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633 COLLEGE EDUCATION B.A. degree in Criminal Justice from Cal State, Fullerton in

More information

The Basics of Digital Forensics; John Sammons; Syngress, 2011; ISBN-13: 978-1-59749-662-9

The Basics of Digital Forensics; John Sammons; Syngress, 2011; ISBN-13: 978-1-59749-662-9 COURSE OUTLINE COURSE NUMBER: DIT 33003 1201 COURSE NAME: INSTRUCTOR: INSTRUCTOR CONTACT: COMPUTER FORENSICS GIDZAK Provided in class. DATES & TIMES: March 18-28, 2013, Mon-Thu (8 classes) 9:00am 12:00pm

More information

e-discovery Forensics Incident Response

e-discovery Forensics Incident Response e-discovery Forensics Incident Response NetSecurity Corporation 21351 Gentry Drive Suite 230 Dulles, VA 20166 VA DCJS # 11-5605 Phone: 703.444.9009 Toll Free: 1.866.664.6986 Web: www.netsecurity.com Email:

More information

Expert Reference Series of White Papers. 10 Security Concerns for Cloud Computing

Expert Reference Series of White Papers. 10 Security Concerns for Cloud Computing Expert Reference Series of White Papers 10 Security Concerns for Cloud Computing 1-800-COURSES www.globalknowledge.com 10 Security Concerns for Cloud Computing Michael Gregg, Global Knowledge Instructor,

More information

Computer Forensics JumpStart Michael G. Solomon, Diane Barrett, Neil Broom

Computer Forensics JumpStart Michael G. Solomon, Diane Barrett, Neil Broom SYBEX Index Computer Forensics JumpStart Michael G. Solomon, Diane Barrett, Neil Broom Index Copyright 2004 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. World rights reserved. No part of

More information

Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA

Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA Mr. Rojas has over 25 years of information systems consulting, supervisory, managerial and executive experience in various industries. He is considered

More information

MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1

MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1 MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:

More information

CYBER FORENSICS (W/LAB) Course Syllabus

CYBER FORENSICS (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 CYBER FORENSICS (W/LAB) Course Syllabus Course Number: CSFS-0020 OHLAP Credit: Yes OCAS Code: 8134 Course Length: 130 Hours Career Cluster: Information

More information

Overview of Computer Forensics

Overview of Computer Forensics Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National

More information

Digital Forensic Techniques

Digital Forensic Techniques Digital Forensic Techniques Namrata Choudhury, Sr. Principal Information Security Analyst, Symantec Corporation Professional Techniques T23 CRISC CGEIT CISM CISA AGENDA Computer Forensics vs. Digital Forensics

More information

Digital Forensics. Tom Pigg Executive Director Tennessee CSEC

Digital Forensics. Tom Pigg Executive Director Tennessee CSEC Digital Forensics Tom Pigg Executive Director Tennessee CSEC Definitions Digital forensics Involves obtaining and analyzing digital information as evidence in civil, criminal, or administrative cases Analyze

More information

Future of Digital Forensics: A Survey of Available Training

Future of Digital Forensics: A Survey of Available Training Future of Digital Forensics: A Survey of Available Training A. Evans, A. Williams, and J. Graham Computer Science Department, Norfolk State University, Norfolk, VA USA Abstract The field of forensics is

More information

Minnesota State Community and Technical College Detroit Lakes Campus

Minnesota State Community and Technical College Detroit Lakes Campus Computer Network Security Minnesota State Community and Technical College Detroit Lakes Campus Overview Philosophy Note on 2 year Colleges Certifications Program Courses CCDC Program Numbers Faculty Future

More information

Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE

Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE 2016 Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE Instructional Design Boost elearning Interactive IT Training Boost elearning's Interactive IT Training provides

More information

Digital Forensics Tutorials Acquiring an Image with FTK Imager

Digital Forensics Tutorials Acquiring an Image with FTK Imager Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,

More information

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor IT Audit/Security Certifications Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor Certs Anyone? There are many certifications out there

More information

Incident Response. Summary of Expertise and Experience

Incident Response. Summary of Expertise and Experience Incident Response Summary of Expertise and Experience 2015 The copyright to this document is owned by Symantec. No part of this document may be reproduced, stored in a retrieval system, or transmitted,

More information

RE: School of Computer Forensic Investigation, Class 7, Eastern Michigan University

RE: School of Computer Forensic Investigation, Class 7, Eastern Michigan University December 12, 2006 RE: School of Computer Forensic Investigation, Class 7, Eastern Michigan University Dear Applicant Agency: The Center for Regional and National Security are pleased to announce the seventh

More information

Field of Study Area of Expertise Certification Vendor Course

Field of Study Area of Expertise Certification Vendor Course Field of Study Area of Expertise Certification Vendor Course Advanced Security Certified Information Systems Security Professional (CISSP) ISC2 CISSP Advanced Security CompTIA Advanced Security Practitioner

More information

Modern Digital Forensics!!

Modern Digital Forensics!! ISA 785 Research in Digital Forensics Modern Digital Forensics!! ISA 785! Angelos Stavrou, George Mason University! Modern Digital Forensics What s New 2! New Intellectual property concerns! IP/Brand related

More information

CDFE Certified Digital Forensics Examiner (CFED Replacement)

CDFE Certified Digital Forensics Examiner (CFED Replacement) Course: CDFE Certified Digital Forensics Examiner (CFED Replacement) Description: Price: $3,450.00 Category: Popular Courses Duration: 5 days Schedule: Request Dates Outline: COURSE OVERVIEW Computer Forensics

More information

Hands-On How-To Computer Forensics Training

Hands-On How-To Computer Forensics Training j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE

More information

Information Security Specialist Training on the Basis of ISO/IEC 27002

Information Security Specialist Training on the Basis of ISO/IEC 27002 Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu

More information

DoD Directive (DoDD) 8570 & GIAC Certification

DoD Directive (DoDD) 8570 & GIAC Certification DoD Directive (DoDD) 8570 & GIAC Certification Date Updated: January 2014 National Account Manager 678-714-5712 Director 703-968-0103 What is DoDD 8570? Department of Defense Directive 8570 provides guidance

More information

Principles of Information Assurance Syllabus

Principles of Information Assurance Syllabus Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information

More information

Module 1: Introduction to Designing Security

Module 1: Introduction to Designing Security Module 1: Introduction to Designing Security Table of Contents Module Overview 1-1 Lesson 1: Overview of Designing Security for Microsoft Networks 1-2 Lesson 2: Introducing Contoso Pharmaceuticals: A Case

More information

Digital Forensics & e-discovery Services

Digital Forensics & e-discovery Services Digital Forensics & e-discovery Services U.S. Security Associates Digital Forensics & e-discovery Services 21st century fraud investigations require expert digital forensics skills to deal with the complexities

More information

CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak

CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak CSN08101 Digital Forensics Lecture 4A: Forensic Processes Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Forensics Processes - objectives Investigation Process Forensic Ethics Issues Forensic

More information

Certified Penetration. Testing Consultant (CPTC)

Certified Penetration. Testing Consultant (CPTC) Certified Penetration Testing Consultant (CPTC) Secrets To Acing The Exam and Successful Finding And Landing Your Next Certified Penetration Testing Consultant (CPTC) Certified Job 1 2 Write a review to

More information

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the

More information

CURRICULUM VITAE. David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC

CURRICULUM VITAE. David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC CURRICULUM VITAE David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC EDUCATION: Bachelor of Science, University of the State of New York, Albany, NY, 1995 AA, Criminal

More information

https://agency.governmentjobs.com/dakota/job_bulletin.cfm?jobid=1017820

https://agency.governmentjobs.com/dakota/job_bulletin.cfm?jobid=1017820 Page 1 of 5 DAKOTA COUNTY Employee Relations Administration Center, 1590 Highway 55 Hastings, MN 55033-2372 651.438.4435 http://www.dakotacounty.us INVITES APPLICATIONS FOR THE POSITION OF: Electronic

More information

Anthony Reyes. Curriculum Vitae

Anthony Reyes. Curriculum Vitae Anthony Reyes Curriculum Vitae 44 Wall Street 12th Floor Telephone/Message: New York, N.Y. 10005 212-461-2160 Profile Internationally recognized practitioner, trainer, and lecturer in the area of computer

More information

InfoSec Academy Pen Testing & Hacking Track

InfoSec Academy Pen Testing & Hacking Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

Information Technology Fundamentals

Information Technology Fundamentals Information Technology Fundamentals Student Guide 37677-00 Edition 1 Ê>EcfèRÆ4#Ë 3037677000504 FIRST EDITION First Printing, April 2005 Copyright 2005 Lab-Volt Systems, Inc. All rights reserved. No part

More information

Incident Response and Forensics

Incident Response and Forensics Incident Response and Forensics Yiman Jiang, President and Principle Consultant Sumus Technology Ltd. James Crooks, Manager - Advisory Services PricewaterhouseCoopers LLP UBC 2007-04-12 Outline Computer

More information

BDO CONSULTING FORENSIC TECHNOLOGY SERVICES

BDO CONSULTING FORENSIC TECHNOLOGY SERVICES BDO CONSULTING FORENSIC TECHNOLOGY SERVICES MARCH 2013 AGENDA Introduction About BDO Consulting Computer Forensics & E-Discovery Practice Current Trends Case Studies Q&A Page 2 Michael Barba Managing Director,

More information

Programming Interviews Exposed: Secrets to Landing Your Next Job

Programming Interviews Exposed: Secrets to Landing Your Next Job Programming Interviews Exposed: Secrets to Landing Your Next Job Preface.... xxv Introduction....xxix Chapter 1 Before the Search... 1 Chapter 2 The Job Application Process....9 Chapter 3 Approaches to

More information

Computer and Information Science

Computer and Information Science Computer and Information Science www.odessa.edu/dept/computer Faculty: Katrieva Jones- Munroe, chair The computer information systems curriculum provides students with practical, job- related computer

More information

Computer Forensics Preparation

Computer Forensics Preparation Computer Forensics Preparation This lesson covers Chapters 1 and 2 in Computer Forensics JumpStart, Second Edition. OBJECTIVES When you complete this lesson, you ll be able to Discuss computer forensics

More information

CTC 328: Computer Forensics

CTC 328: Computer Forensics FALL 2010 CSUDH COMPUTER SCIENCE DEPARTMENT CTC 328: Computer Forensics Instructor: Adam Kaplan, Ph.D. E-Mail: [email protected] Office: NSM E-117 WWW (Blackboard Site): http://toro.csudh.edu Class Meetings:

More information

Computer Forensic Capabilities

Computer Forensic Capabilities Computer Forensic Capabilities Agenda What is computer forensics? Where to find computer evidence Forensic imaging Forensic analysis What is Computer Forensics? The preservation, identification, extraction,

More information

Digital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC

Digital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC Digital Forensics: The aftermath of hacking attacks AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC Topics Digital Forensics: Brief introduction Case Studies Case I:

More information

INNOVATION. Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf

INNOVATION. Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf EDUCATION RESEARCH INNOVATION Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf Email: [email protected] Phone: 303.315.5850 Fax: 303.832.0483 JEFF M. SMITH, m.s.

More information

Digital Forensics. Larry Daniel

Digital Forensics. Larry Daniel Digital Forensics Larry Daniel Introduction A recent research report from The Yankee Group found that 67.6 percent of US households in 2002 contained at least one PC The investigators foresee three-quarters

More information

CFIR - Finance IT 2015 Cyber security September 2015

CFIR - Finance IT 2015 Cyber security September 2015 www.pwc.dk Cyber security Audit. Tax. Consulting. Our global team and credentials Our team helps organisations understand dynamic cyber challenges, adapt and respond to risks inherent to their business

More information

ASK PC Certified Information Systems Security Expert - CISSE

ASK PC Certified Information Systems Security Expert - CISSE Course Description As part of our mission to spread the awareness of IT security in the Middle East, we understand that an Arabic course will be valuable for native speakers. This is a comprehensive course

More information

Syllabus. No: CIS 207. Title: Intro to Computer Forensics. Credits: 3. Coordinator: Dr. B. Dike-Anyiam, Computer Science & Networking Lecturer

Syllabus. No: CIS 207. Title: Intro to Computer Forensics. Credits: 3. Coordinator: Dr. B. Dike-Anyiam, Computer Science & Networking Lecturer Syllabus No: CIS 207 Title: Intro to Computer Forensics Credits: 3 Coordinator: Dr. B. Dike-Anyiam, Computer Science & Networking Lecturer Instructor: Dr. B. Dike-Anyiam, Computer Science & Networking

More information

Large Scale Cloud Forensics

Large Scale Cloud Forensics Large Scale Cloud Forensics Edward L. Haletky AstroArch Consulting, Inc. Sam Curry RSA, The Security Division of EMC Session ID: STAR-302 Session Classification: Advanced Happenstance Lo and Behold Sam

More information

Technology Approved Certifications

Technology Approved Certifications Date Approved Designation Certificate Name Points Microsoft Systems Engineering 04/16/2002 MCSE Microsoft Certified Systems Engineer 280 06/14/2007 MCSE: WIN 2003 Microsoft Certified Systems Engineer:

More information

SECURITY CERTIFICATIONS

SECURITY CERTIFICATIONS SECURITY CERTIFICATIONS General Security: Basic Intermediate Advanced Forensics/Anti- Hacking: Basic Intermediate Advanced General Security Basic BISA Brainbench Information Security Administrator This

More information

Services. Computer Forensic Investigations

Services. Computer Forensic Investigations DataTriangle, Inc. is uniquely structured to provide you with a high quality expert as expeditiously as possible. Charles Snipes has nearly 15 years of experience with criminal investigations in the areas

More information

2! Bit-stream copy. Acquisition and Tools. Planning Your Investigation. Understanding Bit-Stream Copies. Bit-stream Copies (contd.

2! Bit-stream copy. Acquisition and Tools. Planning Your Investigation. Understanding Bit-Stream Copies. Bit-stream Copies (contd. Acquisition and Tools COMP 2555: Principles of Computer Forensics Autumn 2014 http://www.cs.du.edu/2555 1 Planning Your Investigation! A basic investigation plan should include the following activities:!

More information

Design and Implementation of a Live-analysis Digital Forensic System

Design and Implementation of a Live-analysis Digital Forensic System Design and Implementation of a Live-analysis Digital Forensic System Pei-Hua Yen Graduate Institute of Information and Computer Education, National Kaohsiung Normal University, Taiwan [email protected]

More information

Certification for Information System Security Professional (CISSP)

Certification for Information System Security Professional (CISSP) Certification for Information System Security Professional (CISSP) The Art of Service Copyright Notice of rights All rights reserved. No part of this book may be reproduced or transmitted in any form by

More information

To Catch a Thief II: Computer Forensics in the Classroom

To Catch a Thief II: Computer Forensics in the Classroom To Catch A Thief II: Computer Forensics in the Classroom Anna Carlin Computer Information Systems Department, California State Polytechnic University Pomona, CA 91768, USA [email protected] Steven

More information

Information Technology Audit & Forensic Techniques. CMA Amit Kumar

Information Technology Audit & Forensic Techniques. CMA Amit Kumar Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques

More information

Jibran Ilyas DIRECTOR

Jibran Ilyas DIRECTOR PROFESSIONAL EXPERIENCE STROZ FRIEDBERG, LLC Director, Incident Response, July 2015 to Present Assistant Director, Incident Response, August 2014 to July 2015 Assist in development of incident response

More information

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad Federal Bureau of Investigation Los Angeles Field Office Computer Crime Squad Overview FBI and Infrastructure Protection Cyber Crime Cases Cyber Law What to do Infrastructure Protection: Traditional Threat

More information