Premium Features

Previous Buy now to get complete version Next
  • Home
uCertify Logo
  • login
  • Signup
    • Help & Support
    • Accessibility
    • Testimonials
  • Powered by uCertify
  • Request Demo
  • Hello GuestLogin or Signup
  • Feedback & Support
    • Support
    • Keyboard Shortcuts
    • Send Feedback
Scroll to top button

A Practical Guide to Digital Forensics Investigations

(DIG-FORENSICS.AB1) / ISBN: 978-1-64459-228-1
This course includes
Lessons
TestPrep
LiveLab
Mentoring (Add-on)
DIG-FORENSICS.AB1 : A Practical Guide to Digital Forensics Investigations
Try this course Pre-Assessment and first two Lessons free No credit card required
Are you an instructor? Teach using uCertify products
Request a free evaluation copy

A Practical Guide to Digital Forensics Investigations

Get to know about digital forensics with the A Practical Guide to Digital Forensics Investigations course and lab. The lab is cloud-based, device-enabled, and can easily be integrated with an LMS. The computer forensics training course and lab provide complete coverage of both technical and investigative skills. The study guide also covers modern devices, networks, and the Internet Addresses online and lab investigations; documentation, admissibility, and more.
Here's what you will get

Lessons
  • 15+ Lessons
  • 119+ Quizzes
  • 531+ Flashcards
  • 531+ Glossary of terms
TestPrep
  • 141+ Pre Assessment Questions
  • 142+ Post Assessment Questions
LiveLab
  • 42+ LiveLab
  • 42+ Video tutorials
  • 36+ Minutes
Here's what you will learn
Download Course Outline
Lesson 1: Introduction
Lesson 2: The Scope of Digital Forensics
  • Popular Myths about Computer Forensics
  • Types of Digital Forensic Evidence Recovered
  • What Skills Must a Digital Forensics Investigator Possess?
  • The Importance of Digital Forensics
  • Job Opportunities
  • A History of Digital Forensics
  • Training and Education
  • Summary
Lesson 3: Windows Operating and File Systems
  • Physical and Logical Storage
  • Paging
  • File Conversion and Numbering Formats
  • Operating Systems
  • Windows Registry
  • Microsoft Office
  • Microsoft Windows Features
  • Summary
Lesson 4: Handling Computer Hardware
  • Hard Disk Drives
  • Cloning a PATA or SATA Hard Disk
  • Removable Memory
  • Summary
  • Reference
Lesson 5: Acquiring Evidence in a Computer Forensics Lab
  • Lab Requirements
  • Private-Sector Computer Forensics Laboratories
  • Computer Forensics Laboratory Requirements
  • Extracting Evidence from a Device
  • Skimmers
  • Steganography
  • Summary
Lesson 6: Online Investigations
  • Working Undercover
  • Dark Web Investigations
  • Virtual Currencies
  • Website Evidence
  • Background Searches on a Suspect
  • Online Crime
  • Capturing Online Communications
  • Edge Web Browser
  • Summary
Lesson 7: Documenting the Investigation
  • Obtaining Evidence from a Service Provider
  • Documenting a Crime Scene
  • Seizing Evidence
  • Documenting the Evidence
  • Using Tools to Document an Investigation
  • Writing Reports
  • Using Expert Witnesses at Trial
  • Summary
Lesson 8: Admissibility of Digital Evidence
  • History and Structure of the United States Legal System
  • Evidence Admissibility
  • Constitutional Law
  • When Computer Forensics Goes Wrong
  • Structure of the Legal System in the European Union (E.U.)
  • Privacy Legislation in Asia
  • Summary
Lesson 9: Network Forensics and Incident Response
  • The Tools of the Trade
  • Networking Devices
  • Understanding the OSI Model
  • Introduction to VoIP
  • Incident Response (IR)
  • STIX, TAXII, and Cybox
  • Advanced Persistent Threats
  • Investigating a Network Attack
  • Summary
Lesson 10: Mobile Forensics
  • The Cellular Network
  • Handset Specifications
  • Mobile Operating Systems
  • Standard Operating Procedures for Handling Handset Evidence
  • Handset Forensics
  • Manual Cellphone Examinations
  • Global Satellite Service Providers
  • Legal Considerations
  • Other Mobile Devices
  • Documenting the Investigation
  • Summary
Lesson 11: Mobile App Investigations
  • Static Versus Dynamic Analysis
  • Dating Apps
  • Rideshare Apps
  • Communication Apps
  • Summary
Lesson 12: Photograph Forensics
  • National Center for Missing and Exploited Children (NCMEC)
  • Project VIC
  • Case Studies
  • Understanding Digital Photography
  • Examining Picture Files
  • Evidence Admissibility
  • Case Studies
  • Summary
Lesson 13: Mac Forensics
  • A Brief History
  • Apple Wi-Fi Devices
  • Macintosh File Systems
  • Macintosh Operating Systems
  • Apple Mobile Devices
  • Performing a Mac Forensics Examination
  • Case Studies
  • Summary
Lesson 14: Case Studies
  • Silk Road
  • Las Vegas Massacre
  • Zacharias Moussaoui
  • BTK (Bind Torture Kill) Serial Killer
  • Cyberbullying
  • Sports
  • Summary
Lesson 15: Internet of Things (IoT) Forensics and Emergent Technologies
  • 5G
  • Wi-Fi 6
  • Wi-Fi Mesh Networks
  • Shodan
  • Mirai Botnet
  • Cryptocurrency Mining
  • Alexa
  • Micro-Chipping
  • Fitness Trackers
  • Apple Watch
  • Action Cameras
  • Police Safety
  • Police Vehicles
  • Vehicle Forensics
  • Low-Tech Solution for High-Tech Seizures
  • Summary

Hands on Activities (Live Labs)

The Scope of Digital Forensics

  • Displaying Metadata Information

Windows Operating and File Systems

  • Enabling the Peek Performance Option
  • Using a Hex Editor
  • Converting an NTFS Partition to FAT32 Using Disk Management
  • Converting a FAT32 Partition to NTFS Using Command Prompt
  • Converting a FAT32 Partition to NTFS Using Disk Management
  • Using FTK Imager
  • Exploring Windows File Registry
  • Using the Event Viewer
  • Using the Disk Defragmenter

Handling Computer Hardware

  • Installing an Optical Drive and a PCI Sound Card
  • Supplying Power to a SATA Drive
  • Installing Expansion Cards on a Motherboard
  • Installing a USB 3.0 PCI Express Card (2.0 x4)
  • Verifying RAM Usage
  • Installing FireWire Cards

Acquiring Evidence in a Computer Forensics Lab

  • Using GREP
  • Using the dd Utility

Online Investigations

  • Using MBSA
  • Using a Numeric IP Address to Locate a Web Server

Network Forensics and Incident Response

  • Analyzing Traffic Captured from Site Survey Software
  • Using NetWitness Investigator
  • Capturing Packets Using Wireshark
  • Using TCPdump
  • Finding a MAC Address of a System
  • Using the tracert Command
  • Getting Information about DNS (Layer 4)
  • Obtaining Information about the Net Firewall Profile
  • Obtaining IP Route Information from the IP Routing Table
  • Obtaining Information about an IP Version
  • Obtaining an IP version of a Network Adapter
  • Getting Information about UDP Ports
  • Getting Information about the Current Connection Statistics of UDP
  • Getting Settings of UDP
  • Getting Information about TCP Ports
  • Getting Information about the Current Connection Statistics of TCP
  • Getting the Settings of TCP

Mobile Forensics

  • Setting Up a VPN in Android
  • Configuring an Email in Android
  • Removing an Account in Android

Mac Forensics

  • Turning on Airplane Mode of an iPhone
  • Viewing the iOS Version of an iPhone
×
uc logo for app downloadDownload our uCertify App [lms_setting_placeholder: This filed is used to set the LMS settings.

Share with your friends and colleagues

We use cookies to enhance your experience. By continuing to visit this site you agree to our use of cookies. More information
Accept