Design and Implementation of Digital Forensics Labs:
|
|
|
- June Lynette Mitchell
- 10 years ago
- Views:
Transcription
1 Design and Implementation of Digital Forensics Labs: A Case Study for Teaching Digital Forensics to Undergraduate Students Hongmei Chi, Christy Chatmon, Edward Jones, and Deidre Evans Computer and Information Sciences Department Florida Agricultural & Mechanical University 1
2 Overview IA at FAMU-CIS Our approach to teaching digital forensics Student responses Conclusions/Future Works Questions 2
3 Introduction 90% of current crimes involve computers in some way Computer criminals/violators leave a lot of clues & digital evidence An employee is suspected of violating a company s Internet-usage A hard disk is found in the house of a suspected terrorist Abnormal logs are observed on a server a security breach is suspected A person is suspected of a murder or kidnapping 3
4 Introduction What is Digital Forensics? The application of computer investigation and analysis techniques in the interests of determining potential legal evidence Capturing and Classifying digital evidence Increased need for computer forensics professionals and technicians growth in digital forensics education & training 4
5 Introduction FAMU: 13,000 students with 95% being African- American FAMU CIS: 300 undergrads and 30 graduate students enrolled in Department of Computer and Information Sciences 5
6 IA at FAMU-CIS Positive track record in Information Assurance Education (IAE) Three-course undergraduate IA curriculum track certified by NSA and CNSS training standards NSTISSI 4011 (INFOSEC Professional) [ ] NSTISSI 4014 (Information Systems Security Officer EL) [ ] NSTISSI 4012 (Senior Systems Manager) [Preparing for Review] 6
7 IA at FAMU-CIS FAMU s CIS positive track record in IAE IA Courses CIS 4360: Intro to Computer Security CNT 4406: Network Security & Cryptography CIS 4361: Applied Security CIS 4364: Digital Forensics Year Total N/A N/A N/A N/A Certificates Awarded N/A
8 IA at FAMU-CIS Stand-Alone Security Lab 8
9 Our Approach to teaching DF Skills needed for DF Professionals: Legal Procedures & Laws of Evidence Investigative Techniques Computer Technology Audience for our DF Course Computer Science majors Criminal Justice majors Local law enforcement 9
10 Our Approach to teaching DF Course accommodations for non-cis majors: (Lectures) introduce relevant computing concepts & terminology (Hands-on Labs) apply computing concepts directly to tasks related to digital forensics 10
11 Our Approach to teaching DF (2) types of hands-on lab assignments: Windows-based labs (Introductory) To prepare those students with less computing knowledge & experience Windows and Linux based labs (Advanced Topics) Blended lab student teams (CJ & CIS) To ensure that teams have subject matter expertise & technical knowledge To facilitate exchange of knowledge 11
12 Our Approach to teaching DF Labs are designed to expose students to: Evidence Identification Preservation Extraction Documentation Interpretation Labs cover four aspects of investigations: investigation Web activities investigation Window registry investigation Live and memory investigation 12
13 Our Approach to teaching DF Teaching DF: Challenge #1 Commercial DF tools are expensive Average cost - $3,000 to $5,000 per license Solution: Open source & freeware forensics tools 13
14 Our Approach to teaching DF Tool: Cain Abel SAMinside John The Ripper Camouflage Helix Sleuth Features: Password recovery for Windows Password recovery for Windows Password recovery for Windows and Linux Digital steganography Imager; Password recovery; Cookie viewer; Internet history viewer; Register viewer; File recovery; Protected storage viewer; Scan for pictures Create timeline of file activity; Sorts files based on file type; Performs extension checking and hash database lookups; Analyze image partition structures process data units at content location 14
15 Our Approach to teaching DF WinHex Log Parser Tool: Paraben Demo AccessData Forensic Toolkit (FTK) Features: Disk editor; Data recovery; Analyze and compare files; Disk cloning; Drive and file wiper; Encryption View event log; View the registry; Use queries to retrieve valuable information from data Cell phone forensics; investigation Imager; Registry viewer; Password recovery; Query searching; Data carving; Integrated viewers and media player to view any set of data 15
16 Our Approach to teaching DF Teaching DF: Challenge #2 Finding real data for students to practice their skills Solution: Honeynet project ( Deploy honeynets all around the world, capture attacks in the wild, analyze this information and share finings Three types of challenges offered: Scan of the Month Challenges The Reverse Challenge The Forensic Challenge New case studies posted often (no longer updated monthly) Useful to help security community develop forensic and analysis skills to decode real attacks 16
17 Our Approach to teaching DF Scan24 challenge case study: (example) Scenario: Joe Jacabs, 28, was arrested yesterday on charges of selling illegal drugs to high school students. Local police officer posed as a student at Smith Hill High School and was approached by Joe to purchase marijuana. Jacobs has denied selling drugs at any other school and refuses to provide police with the name of his supplier/producer. 17
18 Our Approach to teaching DF Scan24 challenge case study: (example) Student task: The police have imaged the suspect s disk and have provided you (the student) with a copy. Examine the disk and provide answers to the following questions: Who is Joe Jacob s supplier of marijuana, and what is the address listed for the supplier? What crucial data are available within the coverpage.jpg file, and why is this data crucial? What (if any) other high schools besides Smith Hill High School does Joe Jacobs frequent? For each file, what processes were taken by the suspect to mask them from others? What processes did you (the investigator) use to successfully examine the entire contents of each file? (Bonus Question): What Microsoft program was used to create the Cover Page file? What is your proof (Proof is the key to getting this question right, not just guessing). 18
19 Student Responses Overall very positive responses Feedback from a few students: The labs use real-world cases. Solving these real challenge cases inspired me to work in a digital forensics related field in the future. The hands-on labs using FTK, Helix, and Slueth Tools and being able to act as investigator is very interesting. I would like to work as a digital forensics professional in the future. Student term project: Design a lab assignment using one or two open source tools. 19
20 Future Works Expand the design variations of our labs using the most popular forensics tools Explore other design approaches to ensure that the labs are adaptable to different levels of student expertise (non-major service course for the university) Develop a set of hands-on labs playing games/competitions using such environments as CyberCIEGE 20
21 Conclusion Hands-on labs were most useful to help students grasp difficult concepts and procedures, especially the non-majors Utilizing open-source tools & available real data to analyze, gave the students a rich experience and increased excitement about potentially pursuing an information security related profession 21
22 Questions? 22
EC-Council Ethical Hacking and Countermeasures
EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
Digital Forensics. Tom Pigg Executive Director Tennessee CSEC
Digital Forensics Tom Pigg Executive Director Tennessee CSEC Definitions Digital forensics Involves obtaining and analyzing digital information as evidence in civil, criminal, or administrative cases Analyze
Hands-On How-To Computer Forensics Training
j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE
Minnesota State Community and Technical College Detroit Lakes Campus
Computer Network Security Minnesota State Community and Technical College Detroit Lakes Campus Overview Philosophy Note on 2 year Colleges Certifications Program Courses CCDC Program Numbers Faculty Future
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Introduction The Computer Forensics and Investigation course presents methods to properly conduct a computer forensics investigation
To Catch a Thief: Computer Forensics in the Classroom
To Catch a Thief: Computer Forensics in the Classroom Anna Carlin [email protected] Steven S. Curl [email protected] Daniel Manson [email protected] Computer Information Systems Department California
C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR
1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge skills in computer
Information Technologies and Fraud
Information Technologies and Fraud Florin Gogoasa CISA, CFE, CGEIT, CRISC ACFE Romania - Founder and Board member Managing Partner Blue Lab Consulting Information Technologies for Fraud investigation A.
Chapter 7 Securing Information Systems
1 Chapter 7 Securing Information Systems LEARNING TRACK 3: COMPUTER FORENSICS For thirty years, a serial murderer known as the BTK killer (standing for bind, torture, and kill) remained at large in Wichita,
Digital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC
Digital Forensics: The aftermath of hacking attacks AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC Topics Digital Forensics: Brief introduction Case Studies Case I:
Computer Hacking Forensic Investigator v8
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Computer Hacking Forensic Investigator v8 Course Description: EC-Council releases the most advanced Computer
C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR
Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge
Scene of the Cybercrime Second Edition. Michael Cross
Scene of the Cybercrime Second Edition Michael Cross Chapter 1 Facing the Cybercrime Problem Head-On 1 Introduction 2 Defining Cybercrime 2 Understanding the Importance of Jurisdictional Issues 3 Quantifying
Certified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
Certified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
InfoSec Academy Forensics Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
Certified Digital Forensics Examiner
Cyber Security Training & Consulting Certified Digital COURSE OVERVIEW 5 Days 40 CPE Credits $3,000 Digital is the investigation and recovery of data contained in digital devices. This data is often the
How To Get A Computer Hacking Program
CHFI v8(computer Hacking Forensics Investigator) Course Description & Overview Overview CHFIv8 Course Description EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator
CYBER FORENSICS (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 CYBER FORENSICS (W/LAB) Course Syllabus Course Number: CSFS-0020 OHLAP Credit: Yes OCAS Code: 8134 Course Length: 130 Hours Career Cluster: Information
ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING
ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING MODULE A INTRODUCTION TO COMPUTER FORENSICS AND NVESTIGATIONS A1.0 Explain concepts related to computer forensics. A1.1 This module is measured
CERTIFIED DIGITAL FORENSICS EXAMINER
CERTIFIED DIGITAL FORENSICS EXAMINER KEY DATA Course Title: C)DFE Duration: 5 days CPE Credits: 40 Class Format Options: Instructor-led classroom Live Online Training Computer Based Training Who Should
TEACHING COMPUTER SECURITY WITH A HANDS-ON COMPONENT
TEACHING COMPUTER SECURITY WITH A HANDS-ON COMPONENT Narayan Murthy Pace University, New York [email protected] Abstract To address national needs for computer security education, many universities have
To Catch a Thief II: Computer Forensics in the Classroom
To Catch A Thief II: Computer Forensics in the Classroom Anna Carlin Computer Information Systems Department, California State Polytechnic University Pomona, CA 91768, USA [email protected] Steven
information security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
Digital evidence obfuscation: recovery techniques
To appear in Proceedings of the Society for Optical Engineering Conference. Orlando, FL. Digital evidence obfuscation: recovery techniques J. Philip Craiger* a, Jeff Swauger b, Chris Marberry b a National
COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL)
COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL) COURSE DESCRIPTION: Computer Forensics is focused on teaching
Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM)
s Unix Definition of : Computer Coherent application of a methodical investigatory techniques to solve crime cases. Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM) s Unix
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert [email protected] Why should we care about CYBER CRIME & CYBER SECURITY? Clarification
MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
Course Title: Computer Forensic Specialist: Data and Image Files
Course Title: Computer Forensic Specialist: Data and Image Files Page 1 of 9 Course Description The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute
Computer Forensic Tools. Stefan Hager
Computer Forensic Tools Stefan Hager Overview Important policies for computer forensic tools Typical Workflow for analyzing evidence Categories of Tools Demo SS 2007 Advanced Computer Networks 2 Important
CYBER FORENSICS. KRISHNA SASTRY PENDYALA Cyber Forensic Division Central Forensic Science Laboratory Hyderabad.
CYBER FORENSICS KRISHNA SASTRY PENDYALA Cyber Forensic Division Central Forensic Science Laboratory Hyderabad. 11 DIGITAL EVIDENCE? Cyber crimes Digital evidence Digital evidence is any information of
Digital Forensics Tutorials Acquiring an Image with FTK Imager
Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,
Computer and Information Science
Computer and Information Science www.odessa.edu/dept/computer Faculty: Katrieva Jones- Munroe, chair The computer information systems curriculum provides students with practical, job- related computer
Impact of Digital Forensics Training on Computer Incident Response Techniques
Impact of Digital Forensics Training on Computer Incident Response Techniques Valorie J. King, PhD Collegiate Associate Professor University of Maryland University College Presentation to AFCEA June 25,
Where is computer forensics used?
What is computer forensics? The preservation, recovery, analysis and reporting of digital artifacts including information stored on computers, storage media (such as a hard disk or CD-ROM), an electronic
ITU Session Four: Device Imaging And Analysis. Mounir Kamal Q-CERT
ITU Session Four: Device Imaging And Analysis Mounir Kamal Q-CERT 2 Applying Forensic Science to Computer Systems Like a Detective, the archaeologist searches for clues in order to discover and reconstruct
The Role of Digital Forensics within a Corporate Organization
May 2006, IBSA Conference, Vienna The Role of Digital Forensics within a Corporate Organization Bruce J. Nikkel IT Investigation & Forensics Risk Control, UBS AG Presentation Summary An overview of digital
Computer Information Technology
Computer Information Technology Business and Social Sciences Division, Room A44, (847) 543-04 The Computer Information Technology degree programs provide five specialty options with a common core of general
CTC 328: Computer Forensics
FALL 2010 CSUDH COMPUTER SCIENCE DEPARTMENT CTC 328: Computer Forensics Instructor: Adam Kaplan, Ph.D. E-Mail: [email protected] Office: NSM E-117 WWW (Blackboard Site): http://toro.csudh.edu Class Meetings:
Forensics Book 2: Investigating Hard Disk and File and Operating Systems. Chapter 5: Windows Forensics II
Forensics Book 2: Investigating Hard Disk and File and Operating Systems Chapter 5: Windows Forensics II Objectives Understand event logs Understand other audit events Understand forensic analysis of event
What is Digital Forensics?
DEVELOPING AN UNDERGRADUATE COURSE IN DIGITAL FORENSICS Warren Harrison PSU Center for Information Assurance Portland State University Portland, Oregon 97207 [email protected] What is Digital Forensics?
RE: School of Computer Forensic Investigation, Class 7, Eastern Michigan University
December 12, 2006 RE: School of Computer Forensic Investigation, Class 7, Eastern Michigan University Dear Applicant Agency: The Center for Regional and National Security are pleased to announce the seventh
Digital Forensic Techniques
Digital Forensic Techniques Namrata Choudhury, Sr. Principal Information Security Analyst, Symantec Corporation Professional Techniques T23 CRISC CGEIT CISM CISA AGENDA Computer Forensics vs. Digital Forensics
NORTH CAROLINA COMMUNITY COLLEGE SYSTEM H. Martin Lancaster, President
NORTH CAROLINA COMMUNITY COLLEGE SYSTEM H. Martin Lancaster, President February 7, 2008 RESPONSE DEADLINE: February 28, 2008 MEMORANDUM TO: FROM: SUBJECT: Chief Academic Officers Delores A. Parker, Vice
Table of Contents. Introduction. Audience. At Course Completion
Table of Contents Introduction Audience At Course Completion Prerequisites Certified Professional Exams Student Materials Course Outline Introduction This four-day, instructor-led course provides students
Implementing a Microsoft SQL Server 2005 Database
This class combines two courses into one 5-day class. 2779 (3-day) & 2780 (2-day) Implementing a Microsoft SQL Server 2005 Database Course 2779: Three days; Instructor-Led Introduction This three-day instructor-led
Computer Forensics introduction part A
Computer Forensics introduction part A Dr. Magdalena Szeżyńska, CISA Institute of Electronic Systems WUT [email protected] Summer 2016 Digital Forensic Investigation Concepts A digital investigation
Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation
Computer Forensics and Digital Investigation Computer Security EDA263, lecture 14 Ulf Larson Lecture outline! Introduction to Computer Forensics! Digital investigation! Conducting a Digital Crime Scene
Authority: State Trooper - Pennsylvania State Police United States Marshall Special Deputy
Corporal John Roche Pennsylvania State Police Bureau of Criminal Investigation Special Investigation Service Computer Crime Unit Southwest Computer Crime Task Force Coordinator 4221 Route 288 Highway West
Information Systems Security Certificate Program
Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate
Open Source Security Tools for Information Technology Professionals
Open Source Security Tools for Information Technology Professionals CUNY SPS Course Syllabus Aron Trauring May 23, 2005 (rev October 21, 2005) Course Description Information security is a top priority
Forensically Determining the Presence and Use of Virtual Machines in Windows 7
Forensically Determining the Presence and Use of Virtual Machines in Windows 7 Introduction Dustin Hurlbut Windows 7 has the ability to create and mount virtual machines based upon launching a single file.
Analyzing Huge Data Sets in Forensic Investigations
Analyzing Huge Data Sets in Forensic Investigations Kasun De Zoysa Yasantha Hettiarachi Department of Communication and Media Technologies University of Colombo School of Computing Colombo, Sri Lanka Centre
Cloud Forensics. 175 Lakeside Ave, Room 300A Phone: 802/865-5744 Fax: 802/865-6446 http://www.lcdi.champlin.edu
Cloud Forensics Written & Researched by: Maegan Katz & Ryan Montelbano 175 Lakeside Ave, Room 300A Phone: 802/865-5744 Fax: 802/865-6446 http://www.lcdi.champlin.edu November 4, 2013 Disclaimer: This document
Course Syllabus. Maintaining a Microsoft SQL Server 2005 Database. At Course Completion
Course Syllabus Maintaining a Microsoft SQL Server 2005 Database Elements of this syllabus are subject to change. This five-day instructor-led course provides students with the knowledge and skills to
50331D Windows 7, Enterprise Desktop Support Technician (Windows 10 Curriculum)
This course can be purchased by authorized Microsoft Learning Centers at the Courseware Marketplace web-site. Microsoft Certified Trainers (MCTs) can get a free copy at the same website. About the Course
Promoting Digital Forensics Awareness through the University of Alaska Fairbanks ASSERT Center
Promoting Digital Forensics Awareness through the University of Alaska Fairbanks ASSERT Center Kara Nance, Brian Hay, Christopher Hecker ASSERT Center, University of Alaska Fairbanks [email protected], [email protected],
Large Scale Cloud Forensics
Large Scale Cloud Forensics Edward L. Haletky AstroArch Consulting, Inc. Sam Curry RSA, The Security Division of EMC Session ID: STAR-302 Session Classification: Advanced Happenstance Lo and Behold Sam
Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)
Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) NICE Conference 2014 CYBERSECURITY RESILIENCE A THREE TIERED SOLUTION NIST Framework for Improving Critical Infrastructure Cybersecurity
Getting Physical with the Digital Investigation Process
Getting Physical with the Digital Investigation Process Brian Carrier Eugene H. Spafford Center for Education and Research in Information Assurance and Security CERIAS Purdue University Abstract In this
Certified Digital Forensics Examiner (CDFE)
Certified Digital Forensics Examiner (CDFE) Secrets To Acing The Exam and Successful Finding And Landing Your Next Certified Digital Forensics Examiner (CDFE) Certified Job 1 2 Write a review to receive
A Practical Approach for Evidence Gathering in Windows Environment
A Practical Approach for Evidence Gathering in Windows Environment Kaveesh Dashora Department of Computer Science & Engineering Maulana Azad National Institute of Technology Bhopal, India Deepak Singh
Master of Science in Information Systems & Security Management. Courses Descriptions
Master of Science in Information Systems & Security Management Security Related Courses Courses Descriptions ISSM 530. Information Security. 1 st Semester. Lect. 3, 3 credits. This is an introductory course
Comparing and Contrasting Windows and Linux Forensics. Zlatko Jovanovic. International Academy of Design and Technology
Comparing and Contrasting Windows and Linux Forensics Zlatko Jovanovic International Academy of Design and Technology Abstract Windows and Linux are the most common operating systems used on personal computers.
MS-6426 -Configure and Troubleshoot Identity Access Solutions with Windows Server 2008 Active Directory
MS-6426 -Configure and Troubleshoot Identity Access Solutions with Windows Server 2008 Active Directory Table of Contents Introduction Audience At Clinic Completion Prerequisites Microsoft Certified Professional
Information Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
Modern Digital Forensics!!
ISA 785 Research in Digital Forensics Modern Digital Forensics!! ISA 785! Angelos Stavrou, George Mason University! Modern Digital Forensics What s New 2! New Intellectual property concerns! IP/Brand related
2! Bit-stream copy. Acquisition and Tools. Planning Your Investigation. Understanding Bit-Stream Copies. Bit-stream Copies (contd.
Acquisition and Tools COMP 2555: Principles of Computer Forensics Autumn 2014 http://www.cs.du.edu/2555 1 Planning Your Investigation! A basic investigation plan should include the following activities:!
TRACING VNC AND RDP PROTOCOL ARTEFACTS ON WINDOWS MOBILE AND WINDOWS SMARTPHONE FOR FORENSIC PURPOSE
TRACING VNC AND RDP PROTOCOL ARTEFACTS ON WINDOWS MOBILE AND WINDOWS SMARTPHONE FOR FORENSIC PURPOSE Abstract Paresh Kerai School of Computer and Security Science Edith Cowan University Perth, Western
CRIMINAL JUSTICE CERTIFICATE
CRIMINAL JUSTICE CERTIFICATE Course # Course Lec Lab Cr. CRJ 101 Intro to Criminal Justice 3 3 CRJ 102 Police Administration 3 3 CRJ 201 Police Management Systems 3 3 CRJ 203 Criminal Investigation 3 3
ITM 642: Digital Forensics Sanjay Goel School of Business University at Albany, State University of New York
INSTRUCTOR INFORMATION Name: Sanjay Goel Email: [email protected] Phone: (518) 442-4925 Office Location: BA 310b, University at Albany Office Hours: TBD CLASS INFORMATION Time: N/A Location: Online Dates:
A White Paper from AccessData Group. Cerberus. Malware Triage and Analysis
A White Paper from AccessData Group Cerberus Malware Triage and Analysis What is Cerberus? Cerberus is the first-ever automated reverse engineering tool designed to show a security analyst precisely what
Certified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
State of the art of Digital Forensic Techniques
State of the art of Digital Forensic Techniques Enos K. Mabuto 1, H. S Venter 2 Department of Computer Science University of Pretoria, Pretoria, 0002, South Africa Tel: +27 12 420 3654 Email: [email protected]
DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević,
DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE Vahidin Đaltur, Kemal Hajdarević, Internacional Burch University, Faculty of Information Technlogy 71000 Sarajevo, Bosnia
How To Read Memory Chips From A Cell Phone Or Memory Chip
Recovering data from mobile phones An easy, cost-effective service based on the NFI Memory Toolkit by the Netherlands Forensic Institute Mobile phones a rich source of valuable information Mobile phones
Computer Security Courses/Programs
Minneapolis, MN. Computer Security Courses/Programs Developed at Metropolitan State University Jigang Liu Department of Information and Computer Sciences College of Arts and Sciences Metropolitan State
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
TOPICS IN COMPUTER SECURITY
TOPICS IN COMPUTER SECURITY for the undergraduate student Jim Griffin Cabrillo College Abstract: Key words: Cabrillo College has just adopted a new program in Computer Network and System Administration
Incident Response and Computer Forensics
Incident Response and Computer Forensics James L. Antonakos WhiteHat Forensics Incident Response Topics Why does an organization need a CSIRT? Who s on the team? Initial Steps Detailed Project Plan Incident
