Corporate Computer Forensics Training System Laboratory Manual, Volume 1
This is the laboratory and exercise manual to accompany the text manual for Volume I of a corporate and law enforcement computer and digital forensics training system. This training system consists of a text manual with explanations and descriptions with more than 200 pictures, drawings and diagrams. This laboratory and exercise manual contains more than 40 forensic exercises to help prepare students for entry into the profession as a corporate or law enforcement computer examiner. The information presented in this training system is updated by industry practice and research. This training system is designed to be used in a lecture / demonstration environment and requires the use of associated case image files.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Being Interviewed in a Forensics Investigation
Evidence Handling Policy
Chain of Custody
Legal Terms and Definitions
United States Department of Justice Electronic
United States Department of Justice Forensic Examination
Analyze Case Image File 200545
Analyze Case Image File 200650
Evaluators Report of Learner Performance 224
Analyze Case Image File 200540
___________________________________________________ ___________________________________________________ Policy Access Data Forensic begin this lab button Chain of Custody CMOS command prompt computer forensics create D. B. Cooper Data Forensic Tool debug devices disk drive Double-click electronic evidence encrypted Enter the command Evaluators Review Evidence Handling Policy Excel File exercise Explain the section floppy disk folder forensic recovery FORENSICS LAB Future Hard Drives hard disk hexadecimal identified image file instructor interview items and possible law enforcement Learners Performance machine NetCat operating system option original media OVERVIEW Passphrases Passware Password Policy Password Recovery Principle:___________________________________________________ ___________________________________________________ ___________________________________________________ REPORT OF STUDENT Review of Learners screen section titled Select SnagIt Steganography storage STUDENT SUMMARY text file Tool Kit FTK WinHex