Buying for a Team? Gift This Course
Wishlisted Wishlist

Please confirm that you want to add Digital Evidence Acquisition: Protecting your Case to your Wishlist.

Add to Wishlist

Digital Evidence Acquisition: Protecting your Case

Learn basic concepts of digital evidence acquisition, and how you can obtain and protect evidence relating to computers.
4.3 (2 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
21 students enrolled
Created by Rob Robertson
Last updated 7/2014
$10 $20 50% off
4 days left at this price!
30-Day Money-Back Guarantee
  • 25 mins on-demand video
  • 2 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Have a coupon?

This course provides an introduction to acquiring digital evidence relating to computer crimes. Tools of the trade will be identified and shown how to use in a forensically sound environment, that will protect evidence. Forensic images will be created and used to preview, files, obtain protected files, and mount disk images in order to find and retrieve evidence.

Who is the target audience?
  • Forensic Professionals working in law enforcement
  • Forensic consultants
  • Individuals interested in digital evidence collection, and computer forensics
  • First-Responders to a crime scene containing electronic devices
Students Who Viewed This Course Also Viewed
What Will I Learn?
Use Forensic tools to view and obtain digital evidence
Perform forensic imaging of Hard disks
Mount disk images to perform forensic analysis
View Curriculum
  • A computer connected to the internet
  • Old storage devices (to create images from)
Curriculum For This Course
Expand All 7 Lectures Collapse All 7 Lectures 46:14
Introduction to Evidence Acquisition
3 Lectures 02:29

This video provides a quick overview of what the course will cover.

Preview 02:29

These slides provide a brief introduction on what digital evidence is, where we can find it, why we might need it, and how to collect it. There is currently no commentary associated with these slides, so feel free to post questions you might have. The External Resource provides the link to the National Institute of Justice website with additional information regarding how digital evidence is defined.

Defining Evidence
9 pages

This presentation outlines roles and responsibilities associated with digital forensic investigations, based on the FORZA framework. Students will be able to identify the three majors roles relating specifically to digital evidence acquisition, and what those roles will accomplish in relation to investigations and evidence collection.

Evidence Roles and Responsibilities
12 pages
Forensic Tool Tutorials
4 Lectures 22:45

This tool enables the forensic investigator to obtain a memory dump from RAM of a computer that has been seized in conjunction with a crime. Caution: This tool must be used prior to shutting down the computer, otherwise whatever evidence might have been there will be lost.

Preview 04:16

This is a brief tour of the interface to the FTK Imager lite tool.

FTK Imager Lite Tour

This tutorial takes you through creating a disk image of evidence seized in an investigation. It also walks you through mounting the disk image for analysis.

FTK Imager Lite - Creating a Disk Image

Sections 1 and 2 Quiz
6 questions
About the Instructor
4.3 Average rating
2 Reviews
21 Students
1 Course
Forensic Analyst

My current education includes: BA, in History from Portland State University (1993); MBA, from University of Portland (1997); Ph.D. in Information Systems, Security Emphasis (CNSS Certificate) from Nova Southeastern University (2003-2008); CEH (2010); CPT (2010); GCFE (2013); GCFA (2013).

Work in the Security field began in 2006, which includes teaching security courses with my current employer, Southern Utah University. I began teaching internet forensics and network forensics in 2013, after completing the GCFE and GCFA certifications. I also freelance in forensics and security as the opportunity arises.

Report Abuse