Computer Forensics Essential Training
Illustration by John Hersey

Computer Forensics Essential Training

with Jungwoo Ryoo

Start your free trial now, and begin learning software, business and creative skills—anytime, anywhere—with video instruction from recognized industry experts.

Start Your Free Trial Now

Video: Computer Forensics Essential Training: Welcome

Hi, my name is Jungwoo Ryoo and welcome to Computer Forensics Essential Training. This course provides an introduction to computer forensics by Going over all the major aspects of computer forensics. By the end of this course, you will have a good understanding of what computer forensics is all about. We'll start with preparing for computer forensics investigations. In this chapter, we'll be using softer and harder write blockers to protect your evidence.
Expand all | Collapse all
  1. 1m 42s
    1. Welcome
      59s
    2. Using the exercise files
      43s
  2. 8m 8s
    1. Goals of computer forensics
      1m 21s
    2. Types of computer forensics investigations
      1m 55s
    3. Computer forensics tools
      2m 27s
    4. Legal implications
      2m 25s
  3. 19m 11s
    1. Computer forensics hardware
      2m 46s
    2. Computer forensics software
      1m 31s
    3. Computer forensics certifications
      2m 23s
    4. Understanding partitioning
      2m 18s
    5. Understanding hexadecimal numbers
      4m 20s
    6. Using a hex editor
      3m 39s
    7. Understanding an offset
      2m 14s
  4. 28m 57s
    1. Understanding the role of write blockers in preserving data integrity
      2m 16s
    2. Using a software write blocker
      4m 28s
    3. Using a hardware write blocker
      5m 39s
    4. Understanding hashing and its role in ensuring data integrity
      3m 32s
    5. Hashing algorithms
      1m 42s
    6. Understanding mounting
      3m 56s
    7. Mounting manually
      3m 54s
    8. Hashing in computer forensics tools
      3m 30s
  5. 27m 7s
    1. Static acquisition
      25s
    2. Static acquisition with an open-source tool
      3m 48s
    3. Creating split-disk image files with DD
      3m 30s
    4. Static acquisition with dcfldd (forensic DD)
      2m 44s
    5. Static acquisition with a commercial tool
      3m 51s
    6. Live acquisition
      30s
    7. Live acquisition with FTK Imager
      3m 6s
    8. Memory dump analysis with Volatility
      4m 34s
    9. Remote acquisition
      1m 10s
    10. Remote acquisition with a commercial tool
      3m 29s
  6. 31m 39s
    1. Indexing
      1m 54s
    2. Searching
      3m 57s
    3. Generating a report
      3m 40s
    4. Understanding file systems
      4m 3s
    5. Understanding the boot sequence
      4m 28s
    6. Understanding disk drives
      2m 31s
    7. Understanding the master boot record (MBR)
      4m 49s
    8. Hex editor analysis of a file with a wrong extension
      3m 53s
    9. Hex editor analysis of a bit-shifted file
      2m 24s
  7. 1m 1s
    1. Next steps
      1m 1s

please wait ...
Watch the Online Video Course Computer Forensics Essential Training
1h 57m Intermediate Aug 20, 2014

Viewers: in countries Watching now:

Computer forensics is used to find legal evidence in computers or storage devices. Although this course won't teach you how to become a digital forensics detective, it will cover the basics of this growing (and exciting) technical field. Author Jungwoo Ryoo reviews the basics: the goals of computer forensics, the types of investigations it's used for, a forensic investigator's typical toolset, and the legal implications of this type of work. Then he'll show how to prepare for an investigation; acquire data "live" while the system is running, statically from a hard drive, or from a remote machine; make sure data is kept in its original state with software and hardware write blockers; analyze the data; and create a report of your findings. Jungwoo uses a combination of open-source and commercial software, so you'll be able to uncover the information you need with the tools that are in your budget.

Topics include:
  • Understanding computer forensics
  • Understanding partitioning
  • Using a hex editor
  • Preparing a target drive
  • Acquiring data
  • Ensuring data integrity with hashing
  • Indexing and searching
  • Generating a report
Subject:
IT
Author:
Jungwoo Ryoo

Welcome

Hi, my name is Jungwoo Ryoo and welcome to Computer Forensics Essential Training. This course provides an introduction to computer forensics by Going over all the major aspects of computer forensics. By the end of this course, you will have a good understanding of what computer forensics is all about. We'll start with preparing for computer forensics investigations. In this chapter, we'll be using softer and harder write blockers to protect your evidence.

In the next chapter, we'll be using hashing tools, such as md five sum, to verify the validity of your evidence. Next, we'll learn how to acquire data using a commercial data acquisition software such as FDK Imager. Finally, we'll be analyzing the acquired data using open source computer forensics software suite called Autopsy. Now let's get started with Computer Forensics Essential Training.

Find answers to the most frequently asked questions about Computer Forensics Essential Training .


Expand all | Collapse all
please wait ...
Q: Which operating systems support built-in write blocking?
A: Microsoft introduced the registry concept into its OS with the release of Windows 95. As a result, registry-based write blocking has been available since then. In this course, we tested registry-based write blocking on both Windows 7 and Windows 8.
 
If for whatever reason your OS doesn’t support registry-based write blocking, you can enable software-based write blocking via a forensics software suite such as EnCase. Finally, If all fails, you can always use hardware write blockers.
Q: Are there other ways to access deleted files in the usbimage.001 file?
A:  When opening the usbimage.001 file in Autopsy and trying to recover the deleted file (i.e. dreamCar.jpg), as shown the chapter 5 movie “Searching,” if you don’t see the deleted file in the Data Sources tree, you can still view and extract the deleted file in the Views tree as shown below.
 
faq2.jpg
 
Share a link to this course

What are exercise files?

Exercise files are the same files the author uses in the course. Save time by downloading the author's files instead of setting up your own files, and learn by following along with the instructor.

Can I take this course without the exercise files?

Yes! If you decide you would like the exercise files later, you can upgrade to a premium account any time.

Become a member Download sample files See plans and pricing

Please wait... please wait ...
Upgrade to get access to exercise files.

Exercise files video

How to use exercise files.

Learn by watching, listening, and doing, Exercise files are the same files the author uses in the course, so you can download them and follow along Premium memberships include access to all exercise files in the library.


Exercise files

Exercise files video

How to use exercise files.

For additional information on downloading and using exercise files, watch our instructional video or read the instructions in the FAQ .

This course includes free exercise files, so you can practice while you watch the course. To access all the exercise files in our library, become a Premium Member.

* Estimated file size

Are you sure you want to mark all the videos in this course as unwatched?

This will not affect your course history, your reports, or your certificates of completion for this course.


Mark all as unwatched Cancel

Congratulations

You have completed Computer Forensics Essential Training.

Return to your organization's learning portal to continue training, or close this page.


OK
Become a member to add this course to a playlist

Join today and get unlimited access to the entire library of video courses—and create as many playlists as you like.

Get started

Already a member ?

Exercise files

Learn by watching, listening, and doing! Exercise files are the same files the author uses in the course, so you can download them and follow along. Exercise files are available with all Premium memberships. Learn more

Get started

Already a Premium member?

Exercise files video

How to use exercise files.

Ask a question

Thanks for contacting us.
You’ll hear from our Customer Service team within 24 hours.

Please enter the text shown below:

The classic layout automatically defaults to the latest Flash Player.

To choose a different player, hold the cursor over your name at the top right of any lynda.com page and choose Site preferences from the dropdown menu.

Continue to classic layout Stay on new layout
Exercise files

Access exercise files from a button right under the course name.

Mark videos as unwatched

Remove icons showing you already watched videos if you want to start over.

Control your viewing experience

Make the video wide, narrow, full-screen, or pop the player out of the page into its own window.

Interactive transcripts

Click on text in the transcript to jump to that spot in the video. As the video plays, the relevant spot in the transcript will be highlighted.

Learn more, save more. Upgrade today!

Get our Annual Premium Membership at our best savings yet.

Upgrade to our Annual Premium Membership today and get even more value from your lynda.com subscription:

“In a way, I feel like you are rooting for me. Like you are really invested in my experience, and want me to get as much out of these courses as possible this is the best place to start on your journey to learning new material.”— Nadine H.

Thanks for signing up.

We’ll send you a confirmation email shortly.


Sign up and receive emails about lynda.com and our online training library:

Here’s our privacy policy with more details about how we handle your information.

Keep up with news, tips, and latest courses with emails from lynda.com.

Sign up and receive emails about lynda.com and our online training library:

Here’s our privacy policy with more details about how we handle your information.

   
submit Lightbox submit clicked
Terms and conditions of use

We've updated our terms and conditions (now called terms of service).Go
Review and accept our updated terms of service.