• Home
uCertify Logo
  • 0
    • Your cart is empty
    • Continue Shopping
    • View Cart
  • Login or Signup
    • Help & Support
    • Accessibility
    • Testimonials
  • Powered by uCertify
  • Request Demo
  • Cart 0
    • Your cart is empty
    • Continue Shopping
    • View Cart
  • Hello GuestLogin or Signup
  • Feedback & Support
    • Support
    • Keyboard Shortcuts
    • Send Feedback
Scroll to top button

A Practical Guide to Computer Forensics Investigations

(comp-forensic) / ISBN: 9781616910426
This course includes
Lessons
TestPrep
LiveLab
Video Lessons (Add-on)
comp-forensic : A Practical Guide to Computer Forensics Investigations
Share
$198
Try This Course Buy Now
4.5 Rating 2 Reviews
Are you an instructor?
Request a free evaluation copy

A Practical Guide to Computer Forensics Investigations

Learn computer forensics investigation with the A Practical Guide to Computer Forensics Investigations course and lab. Lab simulates real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training. The computer forensics training course provides skills on topics such as network, mobile, and photograph forensics, online investigations, and many more. The course offers hands-on activities, numerous case studies, and practical applications of computer forensic techniques.
Here's what you will get

Lessons
  • 13+ Lessons
  • 230+ Quizzes
  • 458+ Flashcards
  • 458+ Glossary of terms
TestPrep
  • 100+ Pre Assessment Questions
  • 100+ Post Assessment Questions
Lab
  • 14+ Performance lab
  • 15+ Video tutorials
Video Tutorials (Add-on)
  • 90+ Video tutorials
Here's what you will learn
Download Course Outline
Lesson 1: Introduction
Lesson 2: The Scope of Computer Forensics
  • Introduction
  • Types of Computer Forensics Evidence Recovered
  • What Skills Must a Computer Forensics Investigator Possess?
  • The Importance of Computer Forensics
  • A History of Computer Forensics
  • Training and Education
  • Summary
  • Assessment
Lesson 3: Windows Operating and File Systems
  • Introduction
  • Physical and Logical Storage
  • File Conversion and Numbering Formats
  • Operating Systems
  • Windows Registry
  • Microsoft Windows Features
  • Summary
  • Assessment
Lesson 4: Handling Computer Hardware
  • Introduction
  • Hard Disk Drives
  • Cloning a PATA or SATA Hard Disk
  • Removable Memory
  • Summary
  • Assessment
  • References
Lesson 5: Acquiring Evidence in a Computer Forensics Lab
  • Introduction
  • Lab Requirements
  • Private Sector Computer Forensics Laboratories
  • Computer Forensics Laboratory Requirements
  • Extracting Evidence from a Device
  • Skimmers
  • Summary
  • Assessment
Lesson 6: Online Investigations
  • Introduction
  • Working Undercover
  • Website Evidence
  • Background Searches on a Suspect
  • Online Crime
  • Capturing Online Communications
  • Summary
  • Assessment
Lesson 7: Documenting the Investigation
  • Introduction
  • Obtaining Evidence from a Service Provider
  • Documenting a Crime Scene
  • Seizing Evidence
  • Documenting the Evidence
  • Using Tools to Document an Investigation
  • Writing Reports
  • Using Expert Witnesses at Trial
  • Summary
  • Assessment
Lesson 8: Admissibility of Digital Evidence
  • Introduction
  • History and Structure of the United States Legal System
  • Evidence Admissibility
  • Constitutional Law
  • When Computer Forensics Goes Wrong
  • Structure of the Legal System in the European Union (E.U.)
  • Structure of the Legal System in Asia
  • Summary
  • Assessment
Lesson 9: Network Forensics
  • Introduction
  • The Tools of the Trade
  • Networking Devices
  • Understanding the OSI Model
  • Advanced Persistent Threats
  • Investigating a Network Attack
  • Summary
  • Assessment
Lesson 10: Mobile Forensics
  • Introduction
  • The Cellular Network
  • Handset Specifications
  • Mobile Operating Systems
  • Standard Operating Procedures for Handling Handset Evidence
  • Handset Forensics
  • Manual Cellphone Examinations
  • Global Satellite Service Providers
  • Legal Considerations
  • Other Mobile Devices
  • Summary
  • Assessment
Lesson 11: Photograph Forensics
  • Introduction
  • Understanding Digital Photography
  • Examining Picture Files
  • Evidence Admissibility
  • Case Studies
  • Summary
  • Assessment
Lesson 12: Mac Forensics
  • Introduction
  • A Brief History
  • Macintosh File Systems
  • Forensic Examinations of a Mac
  • Macintosh Operating Systems
  • Apple Mobile Devices
  • Case Studies
  • Summary
  • Assessment
Lesson 13: Case Studies
  • Introduction
  • Zacharias Moussaoui
  • BTK (Bind Torture Kill) Killer
  • Cyberbullying
  • Sports
  • Summary
  • Assessment
  • Assessment of Cases by Judges

Hands on Activities (Performance Labs)

Windows Operating and File Systems

  • Using a Hex Editor
  • Using FTK Imager
  • Exploring Windows File Registry
  • Using the Disk Defragmenter
  • Using Event Viewer

Handling Computer Hardware

  • Reading the Contents of a Secure Digital Card

Acquiring Evidence in a Computer Forensics Lab

  • Imaging RAM using FTK Imager

Online Investigations

  • Using a Numeric IP Address to Locate a Web Server
  • Printing the Screen Using MAC

Mobile Forensics

  • Locating Local Cell Towers and Antennae
  • Viewing the IMEI through the keypad
  • Identifying the Features of a Cellular Phone

Mac Forensics

  • Converting Epoch Time
  • Working in the Terminal window
Customer Testimonials
Chidi Obum, CCNA Cyber Ops
The inclusion of flashcards makes it easy for memorizing terms and the labs also ensure that the analyst has a practical touch of the forensics process. The quizzes, pre-assessment and post-assessment questions ensure that your knowledge is well tested.
Jon Chan
The computer forensic course is cut out for those who work for the law enforcement or private forensics entity. It comes with well-sorted topics, performance-based labs, and test questions to reinforce the understanding.

Show more

×
uc logo for app downloadDownload our uCertify App [lms_setting_placeholder: This filed is used to set the LMS settings.

Share with your friends and colleagues

We use cookies to enhance your experience. By continuing to visit this site you agree to our use of cookies. More information
Accept