Digital Evidence Acquisition: Protecting your Case
4.3 (2 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
24 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Digital Evidence Acquisition: Protecting your Case to your Wishlist.

Add to Wishlist

Digital Evidence Acquisition: Protecting your Case

Learn basic concepts of digital evidence acquisition, and how you can obtain and protect evidence relating to computers.
4.3 (2 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
24 students enrolled
Created by Rob Robertson
Last updated 10/2014
English
Current price: $12 Original price: $20 Discount: 40% off
4 days left at this price!
30-Day Money-Back Guarantee
Includes:
  • 25 mins on-demand video
  • 2 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion

Training 5 or more people?

Get your team access to Udemy's top 2,000 courses anytime, anywhere.

Try Udemy for Business
What Will I Learn?
  • Use Forensic tools to view and obtain digital evidence
  • Perform forensic imaging of Hard disks
  • Mount disk images to perform forensic analysis
View Curriculum
Requirements
  • A computer connected to the internet
  • Old storage devices (to create images from)
Description

This course provides an introduction to acquiring digital evidence relating to computer crimes. Tools of the trade will be identified and shown how to use in a forensically sound environment, that will protect evidence. Forensic images will be created and used to preview, files, obtain protected files, and mount disk images in order to find and retrieve evidence.

Who is the target audience?
  • Forensic Professionals working in law enforcement
  • Forensic consultants
  • Individuals interested in digital evidence collection, and computer forensics
  • First-Responders to a crime scene containing electronic devices
Compare to Other Computer Forensics Courses
Curriculum For This Course
+
Introduction to Evidence Acquisition
3 Lectures 02:29

This video provides a quick overview of what the course will cover.

Preview 02:29

These slides provide a brief introduction on what digital evidence is, where we can find it, why we might need it, and how to collect it. There is currently no commentary associated with these slides, so feel free to post questions you might have. The External Resource provides the link to the National Institute of Justice website with additional information regarding how digital evidence is defined.

Defining Evidence
9 pages

This presentation outlines roles and responsibilities associated with digital forensic investigations, based on the FORZA framework. Students will be able to identify the three majors roles relating specifically to digital evidence acquisition, and what those roles will accomplish in relation to investigations and evidence collection.

Evidence Roles and Responsibilities
12 pages
+
Forensic Tool Tutorials
4 Lectures 22:45

This tool enables the forensic investigator to obtain a memory dump from RAM of a computer that has been seized in conjunction with a crime. Caution: This tool must be used prior to shutting down the computer, otherwise whatever evidence might have been there will be lost.

Preview 04:16


This is a brief tour of the interface to the FTK Imager lite tool.

FTK Imager Lite Tour
03:17

This tutorial takes you through creating a disk image of evidence seized in an investigation. It also walks you through mounting the disk image for analysis.

FTK Imager Lite - Creating a Disk Image
10:48

Sections 1 and 2 Quiz
6 questions
About the Instructor
Rob Robertson
4.3 Average rating
2 Reviews
24 Students
1 Course
Forensic Analyst

My current education includes: BA, in History from Portland State University (1993); MBA, from University of Portland (1997); Ph.D. in Information Systems, Security Emphasis (CNSS Certificate) from Nova Southeastern University (2003-2008); CEH (2010); CPT (2010); GCFE (2013); GCFA (2013).

Work in the Security field began in 2006, which includes teaching security courses with my current employer, Southern Utah University. I began teaching internet forensics and network forensics in 2013, after completing the GCFE and GCFA certifications. I also freelance in forensics and security as the opportunity arises.