Join Jungwoo Ryoo for an in-depth discussion in this video Using the exercise files, part of Learning Computer Forensics.
If you're a member of Lynda.com, you have access to the exercise files used throughout this title. Once you download the Exercise Files folder, you'll find the subfolders arranged according to the chapters. For example, you have three files in Chapter 5 folder. One of the most important files there is usbimage.zip file, which contains an image of a USB drive. One caution. Since this is an image of a USB drive whose size is about four gigabyte, once you unzip it, the file will be four gigabytes.
So make sure you have enough space to store this file when you unzip it. Let's get started.
- Understanding computer forensics
- Understanding partitioning
- Using a hex editor
- Preparing a target drive
- Acquiring data
- Ensuring data integrity with hashing
- Indexing and searching
- Generating a report
Skill Level Intermediate
Q: Which operating systems support built-in write blocking?
Q: Are there other ways to access deleted files in the usbimage.001 file?
Small Office Networking to Connect, Share, and Printwith Garrick Chow3h 23m Appropriate for all
Heartbleed Tactics for Small IT Shopswith David Gassner16m 39s Beginner
1. Understanding Computer Forensics
2. Preparing for a Computer Forensics Investigation
3. Preserving Data
4. Acquiring Data
5. Analyzing Data
Next steps1m 1s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.