O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Computer Forensics

Video Description

This video based Computer Forensics training course expert Ric Messier will teach you how to get started in this industry. Computer Forensics is a broad topic that touches on many different skills, all specific to answering legal or investigative questions in relation to a computer. Ric will give you an overview of the skills you will need in order to work in this highly technical field.
Because Computer Forensics is a broad field, this course covers a lot of topics, from preparing for an investigation, to ethics, to evidence acquisition, being an expert witness and legal vs. corporate investigations. You will learn about forensic tools and how they are used, such as ProDiscover, FTK, and EnCase. This video tutorial covers wireless network investigations, malware and collecting network evidence. You will also learn about UNIX, Windows, Linux and Mac OS, in order to understand where to look for and recover evidence from.
By the conclusion of this computer based tutorial for Computer Forensics, you will have a clear understanding of what it takes to be a computer forensics investigator, and the tools and techniques available to you to find the evidence you will be looking for.

Table of Contents

  1. Introduction
    1. What Is Forensics? 00:04:09
    2. Professions Needing Forensics 00:07:29
    3. What You Should Expect From This Video 00:04:13
    4. What You Should Know 00:06:31
    5. What You Will Learn 00:04:23
  2. Legal Issues
    1. Chain Of Custody 00:05:46
    2. Evidence Acquisition 00:07:28
    3. Validating Data Under Linux 00:06:57
    4. Validating Data Under Windows 00:04:41
    5. Expert Witness 00:07:15
    6. Ethics For Experts 00:08:14
    7. Evidence Storage 00:06:33
    8. Rules Of Evidence 00:07:16
  3. Investigations
    1. Differences With Legal Investigations 00:06:41
    2. Reasons For Corporate Investigations 00:06:10
    3. Preparing For An Investigation 00:04:50
    4. Forensic Workstation 00:08:42
    5. EnCase 00:04:46
    6. FTK 00:10:37
    7. Coroners Toolkit 00:04:17
    8. ProDiscover Basic 00:07:37
    9. Audit Policies 00:07:52
    10. Reporting 00:10:12
    11. UNIX Tools 00:12:36
    12. Sleuth Kit 00:09:17
    13. DEFT Linux 00:07:09
  4. Operating Systems
    1. Windows Family 00:09:08
    2. Mac OS X 00:10:32
    3. Linux 00:09:14
    4. Other Types Of Operating Systems 00:04:50
    5. Boot Processes 00:07:37
    6. File Systems: Windows-Based 00:09:29
    7. File Systems: Linux 00:09:35
    8. File Systems: Mac OS 00:07:01
    9. File Systems: CD 00:04:45
    10. RAID 00:06:34
    11. Autostarting 00:07:58
    12. Executable Types And Structure: Windows 00:06:50
    13. Executable Types And Structure: Unix-Based 00:10:24
    14. Disk Partitions 00:07:16
  5. Image Acquisition
    1. Image Formats 00:04:11
    2. Image Acquisitions Under Linux 00:06:21
    3. Image Acquisitions Under Windows 00:05:45
    4. Volatile Information 00:11:25
    5. Data Recovery 00:06:45
    6. Hard Drives 00:05:55
  6. Network Acquisitions
    1. OSI Reference Model 00:07:58
    2. TCP/IP 00:08:29
    3. Network Attacks 00:07:57
    4. Reasons For Network Acquisitions 00:07:45
    5. Man In The Middle Attacks 00:07:31
    6. Capturing Traffic 00:09:09
    7. NetworkMiner 00:06:55
    8. Other Network Tools 00:08:57
    9. Wireless Networking 00:07:41
    10. Wireless Tools 00:11:58
    11. Firewalls And Their Uses 00:09:48
    12. Intrusion Detection Systems 00:06:58
  7. Data Spaces
    1. Alternate Data Streams 00:08:29
    2. Deleted Files 00:07:21
    3. Hidden Partitions 00:04:20
    4. Slack Space And Swap File 00:09:50
    5. Registry 00:11:47
    6. Virtual Memory 00:08:58
    7. System Recovery Checkpoints: Windows 00:03:14
    8. Audit Logs And Settings 00:09:03
  8. Data Recovery
    1. Graphics Files 00:09:26
    2. E-Mail 00:08:17
    3. Internet: Cache, Cookies, Etc. 00:09:54
    4. Metadata 00:10:27
    5. Log Files 00:06:43
    6. Steganography 00:03:50
    7. Steganography Techniques: Images And Video 00:05:33
    8. Steganography Techniques: Audio And Documents 00:05:24
    9. Steganalysis 00:07:32
    10. Compression 00:05:44
  9. Virtual Machines
    1. Virtual Machines 00:12:44
    2. Checkpoints 00:05:25
    3. Data Formats 00:06:34
    4. Hypervisors 00:05:04
  10. Mobile Forensics
    1. IOS 00:04:56
    2. Android 00:07:27
    3. Symbian OS 00:03:25
    4. Tools 00:07:51
    5. Memory Considerations 00:04:08
    6. SIM Cards 00:03:25
  11. Malware Forensics
    1. Malware Forensics 00:04:34
    2. Static Malware Analysis 00:08:41
    3. Dynamic Malware Analysis 00:08:38
  12. About Me
    1. About Me 00:02:58