- Understanding computer forensics
- Understanding partitioning
- Using a hex editor
- Preparing a target drive
- Acquiring data
- Ensuring data integrity with hashing
- Indexing and searching
- Generating a report
Skill Level Intermediate
- Hi, my name in Jungwoo Ryoo, and welcome to Computer Forensics Essential Training. This course provides an introduction to computer forensics by going over all the major aspects of computer forensics. By the end of this course, you will have a good understanding of what computer forensics is all about. We'll start with preparing for computer forensics investigations. In this chapter, we will be using software and hardware write blockers to protect your evidence. In the next chapter, we'll be using hashing tools, such as MD5 sum, to verify the validity of your evidence.
Next, we will learn how to acquire data using a commercial data acquisition software, such as FTK imager. Finally, we will be analyzing the acquired data using open source computer software suite, called Autopsy. Now, let's get started with Computer Forensics Essential Training.
Q: Which operating systems support built-in write blocking?
Q: Are there other ways to access deleted files in the usbimage.001 file?
Small Office Networking to Connect, Share, and Printwith Garrick Chow3h 23m Appropriate for all
1. Understanding Computer Forensics
2. Preparing for a Computer Forensics Investigation
3. Preserving Data
4. Acquiring Data
5. Analyzing Data
Next steps1m 1s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.