Hard Disk Forensics: A Learning Guide
Requirements
- Some prior computer science knowledge will be helpful.
Description
Introduction: Welcome to my comprehensive course on Hard Disk Forensics! This course aims to provide a brief overview of all the essential concepts you need to learn to enter the world of Hard Disk Forensics. In just about 36 minutes, you will acquire a solid understanding and a map of resources to systematically learn and practice Hard Disk Forensics.
Course Overview:
In this course, I'll introduce you to a systematic conceptual model that plays a crucial role in understanding the various sub-systems analyzed in Hard Disk Forensics.
You'll learn about the basics of several key components, including Filesystems, The Sleuth Kit tools (the backbone of Autopsy), Partitions, Partition Tables, Partitioning Schemes, Data Link standards like ATA and SCSI (with a focus on ATA), and more.
Foundation for Mastery: This course will lay a strong foundation for your journey to mastering Hard Disk Forensics. With the knowledge gained, you'll be well-equipped to explore the fascinating world of digital investigations.
Systematic Conceptual Model: I'll start by defining a conceptual model with five layers:
Application Layer
Filesystem Layer
Volume Layer
Interface Layer
Physical Layer
Understanding the Layers: Throughout the course, I'll delve into the basics of the first four layers, providing you with valuable resources to explore each layer in depth. This systematic approach will enhance your comprehension and practical skills.
Key Resource: The primary book I have referenced for this course is "Filesystem Forensic Analysis" by Brian Carrier. This resource has been instrumental in shaping the content and knowledge shared in this course.
By the end of this course, you'll have the knowledge and tools to confidently navigate the realm of Hard Disk Forensics.
Who this course is for:
- Anyone interested in Computer Forensics.
Instructor
Nandan has established a proven track record of constructing software from scratch, whether it's a cross-platform desktop app, an Android app, a web app, a software library, or an automation script.
And his interests and skills extend well beyond software development. He has honed his proficiency in various areas, including:
Computer Forensics (Host and Network Forensics): Nandan is well-versed in Disks and File Systems, and he possesses in-depth knowledge of various forensic tools and their internal workings.
Reverse Engineering: Proficient in binary executable formats like COFF/PE and ELF, Nandan demonstrates skills in Memory Scanning, debugging using WinDbg and GDB, disassemblers like Ghidra (though he prefers Binary Ninja), and Windows-specific tools like Sysinternals.
Security Engineering: Nandan's expertise ranges from Application Security (SAST and DAST) to Identity and Access Management (IAM) in an Enterprise network.