Digital Forensics in Cybersecurity

(jbl-sys) / ISBN : 978-1-61691-855-2
Lessons
Lab
Lab (Add-on)
TestPrep
213 Reviews
Get A Free Trial

Skills You’ll Get

1

Welcome to Digital Forensics in Cybersecurity

  • Learning Resources
  • Pacing Guide
2

Introduction to Computer Forensics

  • What Is Computer Forensics?
  • Understanding the Field of Digital Forensics
  • Knowledge Needed for Computer Forensics Analysis
  • The Daubert Standard
  • U.S. Laws Affecting Digital Forensics
  • Federal Guidelines
  • Lesson Summary
3

Overview of Computer Crime

  • 2.0 Modern Computer Forensics
  • How Computer Crime Affects Forensics
  • Identity Theft
  • Hacking
  • Cyberstalking and Harassment
  • Fraud
  • Non-Access Computer Crimes
  • Cyberterrorism
  • Lesson Summary
4

Forensic Methods and Labs

  • Forensic Methodologies
  • Formal Forensic Approaches
  • Documentation of Methodologies and Findings
  • Evidence-Handling Tasks
  • How to Set Up a Forensic Lab
  • Common Forensic Software Programs
  • Forensic Certifications
  • Lesson Summary
5

Collecting, Seizing, and Protecting Evidence

  • Proper Procedure
  • Handling Evidence
  • Storage Formats
  • Forensic Imaging
  • RAID Acquisitions
  • Lesson Summary
6

Understanding Techniques for Hiding and Scrambling Information

  • Steganography
  • Encryption
  • Lesson Summary
7

Recovering Data

  • Undeleting Data
  • Recovering Information from Damaged Media
  • Lesson Summary
8

E-mail Forensics

  • How E-mail Works
  • E-mail Headers
  • Tracing E-mail
  • E-mail Server Forensics
  • E-mail and the Law
  • Lesson Summary
9

Windows Forensics

  • Windows Details
  • Volatile Data
  • Windows Swap File
  • Windows Logs
  • Windows Directories
  • Index.dat
  • The Registry
  • Lesson Summary
10

Linux Forensics

  • 9.0 Linux+ - Disk Management
  • Linux Basics
  • Linux File Systems
  • Linux Logs
  • Linux Directories
  • Shell Commands for Forensics
  • Can You Undelete in Linux?
  • Lesson Summary
11

Macintosh Forensics

  • Mac Basics
  • Macintosh Logs
  • Directories
  • Macintosh Forensic Techniques
  • Can You Undelete in Mac?
  • Lesson Summary
12

Mobile Forensics

  • 11.0 Mobile Forensics 1
  • Cellular Device Concepts
  • What Evidence You Can Get from a Cell Phone
  • Seizing Evidence from a Mobile Device
  • Lesson Summary
13

Performing Network Analysis

  • 12.0 Network Forensics
  • Network Packet Analysis
  • Network Traffic Analysis
  • Router Forensics
  • Firewall Forensics
  • Lesson Summary
14

Incident and Intrusion Response

  • Disaster Recovery
  • Preserving Evidence
  • Adding Forensics to Incident Response
  • Lesson Summary
15

Trends and Future Directions

  • 14.0 Cloud Considerations
  • Technical Trends
  • Legal and Procedural Trends
  • Lesson Summary
16

System Forensics Resources

  • Tools to Use
  • Resources
  • Laws
  • Lesson Summary
A

Appendix A

  • Standard Acronyms
  • List of References

1

Introduction to Computer Forensics

  • Applying the Daubert Standard to Forensic Evidence
2

Overview of Computer Crime

  • Documenting a Workstation Configuration Using Common Forensic Tools
3

Forensic Methods and Labs

  • Uncovering New Digital Evidence Using Bootable Forensic Utilities
4

Collecting, Seizing, and Protecting Evidence

  • Creating a Forensic System Case File for Analyzing Forensic Evidence
5

Understanding Techniques for Hiding and Scrambling Information

  • Analyzing Images to Identify Suspicious or Modified Files
  • Recognizing the Use of Steganography in Image Files
6

Recovering Data

  • File Recovery Procedures Using FTK and Disk Digger in a Windows 10 Environment
7

E-mail Forensics

  • Automating E-mail Evidence Discovery Using Electronic Evidence Examiner (E3)
8

Performing Network Analysis

  • Decoding an FTP Protocol Session for Forensic Evidence
9

System Forensics Resources

  • Identifying and Documenting Evidence from a Forensic Investigation
  • Conducting an Incident Response Investigation for a Suspicious Login

1

System Forensics Resources

  • Performance Assessment Labs

Digital Forensics in Cybersecurity

$145.00

Buy Now
scroll to top