From the course: Operating System Forensics

Operating system forensics

From the course: Operating System Forensics

Start my 1-month free trial

Operating system forensics

- Every device we encounter as a computer forensic specialist has its own operating system, and the more you know about this foundational topic, the better you can manage the evidence in your investigation. Criminals use the intricacies of each OS to conceal information and it's up to you to understand the most likely locations where the evidence is hidden. This can be places like deleted files, select spaces, and alternate data streams in the file system. We'll dive into each of these topics in this course. Hi, I'm Jeong Ho Joo, I'm a college professor who has been teaching since 2005. One of my favorite topics I teach is computer forensics. I've been offering computer forensics course for more than 10 years and have helped many of my students find jobs as digital forensics professionals. This course covers the major topics for practitioners and those who aspire to be in the field of computer forensics. I'm excited to share some practical methos through several hands on examples as we also explore the theories underlying how operating systems function. The goal here is for you to get a deeper understanding of OS forensics and to lay a strong foundation for your preparation for a computer forensics career. I recommend that you watch my learning computer forensics course before taking this one because I provide important prerequisite knowledge there. Let's take our first step.

Contents