Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065

Similar documents
ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING

CYBER FORENSICS (W/LAB) Course Syllabus

EC-Council Ethical Hacking and Countermeasures

Course Title: Computer Forensic Specialist: Data and Image Files

Guide to Computer Forensics and Investigations, Second Edition

CTC 328: Computer Forensics

Computer Hacking Forensic Investigator v8

2! Bit-stream copy. Acquisition and Tools. Planning Your Investigation. Understanding Bit-Stream Copies. Bit-stream Copies (contd.

COMPUTER FORENSICS (EFFECTIVE ) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE CATE STUDENT REPORTING PROCEDURES MANUAL)

MSc Computer Security and Forensics. Examinations for / Semester 1

Hands-On How-To Computer Forensics Training

Chapter 3: The Investigator s Office and Laboratory

Certified Digital Forensics Examiner

Guide to Computer Forensics and Investigations, Second Edition

Digital Forensics & e-discovery Services

CDFE Certified Digital Forensics Examiner (CFED Replacement)

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner

ITM 642: Digital Forensics Sanjay Goel School of Business University at Albany, State University of New York

Technical Procedure for Evidence Search

New Technologies File System (NTFS) Priscilla Oppenheimer. Copyright 2008 Priscilla Oppenheimer

information security and its Describe what drives the need for information security.

CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

Digital Forensics Tutorials Acquiring an Image with FTK Imager

Developing Computer Forensics Solutions for Terabyte Investigations

Guide to Computer Forensics and Investigations, Second Edition

Computer Forensic Capabilities

How To Get A Computer Hacking Program

Digital Forensics. Tom Pigg Executive Director Tennessee CSEC

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

File System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1

Computer Forensic Tools. Stefan Hager

Digital Forensics. Larry Daniel

PREREQUISITE(S): CTS 1131, CTS 1133 and CTS 1120

Digital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC

CERTIFIED DIGITAL FORENSICS EXAMINER

To Catch a Thief: Computer Forensics in the Classroom

Useful Computer Forensics Tools Updated: Jun 10, 2003

ITU Session Four: Device Imaging And Analysis. Mounir Kamal Q-CERT

EnCase 7 - Basic + Intermediate Topics

Scene of the Cybercrime Second Edition. Michael Cross

Computer Forensics as an Integral Component of the Information Security Enterprise

Kernel. What is an Operating System? Systems Software and Application Software. The core of an OS is called kernel, which. Module 9: Operating Systems

Page 1 of 5 Position Code #P Forensic Identification - Technological Crimes Unit ASSOCIATION: Civilian LOCATION: Headquarters

Installing a Second Operating System

Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012

Advanced Diploma In Hardware, Networking & Server Configuration

What is Digital Forensics?

Computer Forensics. Securing and Analysing Digital Information

Multiprogramming. IT 3123 Hardware and Software Concepts. Program Dispatching. Multiprogramming. Program Dispatching. Program Dispatching

EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević,

Incident Response and Computer Forensics

Chapter 5: Fundamental Operating Systems

Where is computer forensics used?

AN INVESTIGATION INTO COMPUTER FORENSIC TOOLS

NIST CFTT: Testing Disk Imaging Tools

Alternate Data Streams in Forensic Investigations of File Systems Backups

Microsoft SQL Database Administrator Certification

A Better Approach to Backup and Bare-Metal Restore: Disk Imaging Technology

Computer Forensics Discipline

RE: School of Computer Forensic Investigation, Class 7, Eastern Michigan University

Cisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002)

CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

QUICK RECOVERY FOR RAID

Computer Forensics Principles and Practices

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

UNDELETE Users Guide

The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices

Microsoft Vista: Serious Challenges for Digital Investigations

PRODISC VER. Computer Forensics Family. User Manual. Version 4.8 9/06

Chapter 8 Objectives. Chapter 8 Operating Systems and Utility Programs. Operating Systems. Operating Systems. Operating Systems.

Quick Start Guide for Linux Based Recovery

CCE Certification Competencies

Learning Objectives. Chapter 1: Networking with Microsoft Windows 2000 Server. Basic Network Concepts. Learning Objectives (continued)

Legal Notices. AccessData Corp.

50238: Introduction to SQL Server 2008 Administration

Forensics on the Windows Platform, Part Two

IFSM 310 Software and Hardware Concepts. A+ OS Domain 2.0. A+ Demo. Installing Windows XP. Installation, Configuration, and Upgrading.

Discovery of Electronically Stored Information ECBA conference Tallinn October 2012

COURCE TITLE DURATION CompTIA A+ Certification 40 H.

ICT Professional Optional Programmes

MS-50292: Administering and Maintaining Windows 7. Course Objectives. Required Exam(s) Price. Duration. Methods of Delivery.

Design and Implementation of Digital Forensics Labs:

Cisco Network Specialist CCNA

ELEN 115 Computer Components and Peripherals

Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Transcription:

Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Introduction The Computer Forensics and Investigation course presents methods to properly conduct a computer forensics investigation beginning with a discussion of ethics, while mapping to the objectives of the International Association of Computer Investigative Specialists (IACIS) certification. Prerequisites Students should have a working knowledge of hardware and operating systems to maximize their success on projects and exercises throughout the text. Course Outline Module 1: Computer Forensics and Investigations as a Profession Understanding Computer Forensics Comparing Definitions of Computer Forensics Exploring a Brief History of Computer Forensics Developing Computer Forensics Resources Preparing for Computing Investigations Understanding Enforcement Agency Investigations Understanding Corporate Investigations Maintaining Professional Conduct Module 2: Understanding Computer Investigations Preparing a Computer Investigation Examining a Computer Crime Examining a Company-Policy Violation Taking a Systematic Approach Assessing the Case Planning Your Investigation Securing Your Evidence Understanding Data-Recovery Workstations and Software Setting Up Your Workstation for Computer Forensics Conducting an Investigation Gathering the Evidence Creating a Forensic Boot Floppy Disk Assembling the Tools for a Forensic Boot Floppy Disk Retrieving Evidence Data Using a Remote Network Connection Copying the Evidence Disk Creating a Bit-Stream Image with FTK Imager Analyzing Your Digital Evidence Completing the Case Critiquing the Case Module 3: The Investigator s Office and Laboratory Understanding Forensic Lab Certification Requirements

Identifying Duties of the Lab Manager and Staff Lab Budget Planning Acquiring Certification and Training Determining the Physical Layout of a Computer Forensics Lab Identifying Lab Security Needs Conducting High-Risk Investigations Considering Office Ergonomics Considering Environmental Conditions Considering Structural Design Considerations Determining Electrical Needs Planning for Communications Installing Fire-suppression Systems Using Evidence Containers Overseeing Facility Maintenance Considering Physical Security Needs Auditing a Computer Forensics Lab Determining Floor Plans for Computer Forensics Labs Selecting a Basic Forensic Workstation Selecting Workstations for Police Labs Selecting Workstations for Private and Corporate Labs Stocking Hardware Peripherals Maintaining Operating Systems and Application Software Inventories Using a Disaster Recovery Plan Planning for Equipment Upgrades Using Laptop Forensic Workstations Building a Business Case for Developing a Forensics Lab Preparing a Business Case for Developing a Forensics Lab Module 4: Current Computer Forensics Tools Computer Forensics Software Needs Types of Computer Forensics Tools Task Performed by Types of Computer Forensics Tools Tool Comparisons Other Consideration for Tools Computer Forensics Software Command-line Forensics UNIX/Linux Command-line Forensic Tools GUI Forensics Tools Computer Hardware Tools Computer Investigation Workstations Validating and Testing Forensics Software Using National Institute of Standards and Technology (NIST) Tools The Validation Protocols Module 5: Processing Crime and IncidentScenes Collecting Evidence in Private-Sector Incident Scenes

Processing Law Enforcement Crime Scenes Understanding Concepts and Terms Used in Warrants Preparing for a Search Identifying the Nature of the Case Identifying the Type of Computing System Determining Whether You Can Seize a Computer Obtaining a Detailed Description of the Location Determining Who Is in Charge Using Additional Technical Expertise Determining the Tools You Need Preparing the Investigation Team Securing a Computer Incident or Crime Scene Seizing Digital Evidence at the Scene Processing a Major Incident or Crime Scene Processing Data Centers with an Array of RAIDS Using a Technical Advisor at an Incident or Crime Scene Sample Civil Investigation Sample Criminal Investigation Reviewing a Case Identifying the Case Requirements Planning Your Investigation Module 6: Digital Evidence Controls Identifying Digital Evidence Understanding Evidence Rules Securing Digital Evidence at an Incident Scene Cataloging Digital Evidence Lab Evidence Considerations Processing and Handling Digital Evidence Storing Digital Evidence Evidence Retention and Media Storage Needs Documenting Evidence Obtaining a Digital Signature Module 7: Working with Windows and DOS Systems Understanding File Systems Understanding the Boot Sequence Understanding Disk Drives Exploring Microsoft File Structures Disk Partition Concerns Master Boot Record Examining FAT Disks Examining NTFS Disks NTFS System Files NTFS Attributes NTFS Data Streams NTFS Compressed Files NTFS Encrypted File Systems (EFS)

EFS Recovery Key Agent Deleting NTFS Files Understanding the Windows Registry Windows 9x Registry Windows 2000 & XP Registry Understanding Microsoft Boot Tasks Windows XP, 2000, and NT Startup Windows XP System Files Windows 9x and Me Startup Understanding MS-DOS Startup Tasks Other DOS Operating Systems DOS Commands and Batch Files Module 8: Macintosh and Linux Boot Processes and File Systems Understanding the Macintosh File Structure Understanding Volumes Exploring Macintosh Boot Tasks Using Macintosh Forensic Software Examining UNIX and Linux Disk Structures UNIX and Linux Overview Understanding modes Understanding UNIX and Linux Boot Processes Understanding Linux Loader and GRUB UNIX and Linux Drives and Partition Scheme Examining CD Data Structures Understanding Other Disk Structures Examining SCSI Disks Examining IDE/EIDE Devices Module 9: Data Acquisition Determining the Best Acquisition Method Planning Data Recovery Contingencies Using MS-DOS Acquisition Tools Understanding How DriveSpy Accesses Sector Ranges Using DriveSpy Data-Preservation Commands Using DriveSpy Data Manipulation Commands Using Windows Acquisition Tools AccessData FTK Explorer Using Windows Acquisition Tools AccessData FTK Imager Using X-Ways Replica Using Replica PDA Data Acquisitions General Considerations for PDA Investigations Using Other Forensics Acquisition Tools Exploring SnapBack DatArrest

Exploring SafeBack Exploring EnCase Module 10: Computer Forensic Analysis Understanding Computer Forensic Analysis Refining the Investigation Plan Using DriveSpy to Analyze Computer Data DriveSpy Command Switches DriveSpy Keyword Searching DriveSpy Scripts DriveSpy Data-Integrity Tools DriveSpy Residual Data Collection Tools Other Useful DriveSpy Command Tools Using Other Digital Intelligence Computer Forensics Tools Using PDBlock and PDWipe Using AccessData's Forensic Toolkit Using Guidance Software s EnCase Approaching Computer Forensics Cases Performing a Computer Forensic Analysis Setting Up Your Forensic Workstation Performing Forensic Analysis on Microsoft File Systems UNIX and Linux Forensic Analysis Macintosh Investigations Addressing Data Hiding Techniques Hiding Partitions Marking Bad Clusters Bit-Shifting Using Steganography Examining Encrypted Files Recovering Passwords Module 11: Recovering Image Files Recognizing an Image File Understanding Bitmap and Raster Images Understanding Vector Images Metafle Graphics Understanding Image File Formats Understanding Data Compression Reviewing Lossless and Lossy Compression Locating and Recovering Image Files Identifying Image File Fragments Repairing Damaged Headers Carving Data from Unallocated Space Rebuilding File Headers Reconstructing File Fragments

Identifying Unknown File Formats Analyzing Image File Headers Tools for Viewing Images Understanding Steganography in Image Files Using Steganalysis Tools Identifying Copyright Issues with Graphics Module 12: Network Forensics Understanding Internet Fundamentals Internet Protocols Understanding Network Basics Acquiring Data on Linux Computers Understanding Network Forensics Approach to Network Forensics Network Logs Using Network Tools UNIX / Linux Tools Network Sniffers Honeynet Project Module 13: E-mail Investigations Exploring the Roles of the Client and Server in E-mail Investigating E-mail Crimes and Violations Identifying E-mail Crimes and Violations Examining E-mail Messages Viewing E-mail Headers Examining an E-mail Header Examining Additional E-mail Files Tracing an E-mail Message Using Network Logs Related to E-mail Understanding E-mail Servers Examining UNIX E-mail Server Logs Examining Microsoft E-mail Server Logs Examining Novell GroupWise E-mail Logs Using Specialized E-mail Forensics Tools Module 14: Becoming an Expert Witness Understanding the Importance of Reports Limiting the Report to Specifics Types of Reports Guidelines for Writing Reports Report Structure Writing Reports Clearly Designing the Layout and Presentation of Reports

Generating Report Findings with Forensic Software Tools Using FTK Demo Version Forming an Expert Opinion Preparing for Testimony Documenting and Preparing Evidence Processing Evidence Serving as a Consulting Expert or an Expert Witness Creating and Maintaining Your CV Preparing Technical Definitions Testifying in Court Understanding the Trial Process Qualifying Your Testimony and Voir Dire Addressing Potential Problems Testifying in General Presenting Your Evidence Helping Your Attorney Avoiding Testimony Problems Testifying During Direct Examination Using Graphics in Your Testimony Testifying During Cross-Examination Exercising Ethics When Testifying Understanding Prosecutorial Misconduct Preparing for a Deposition Guidelines for Testifying at a Deposition Recognizing Deposition Problems Public Release: Dealing with Reporters