Surviving Digital Forensics: Imaging a Mac Fusion Drive

Helping you sharpen your computer forensic skills
4.2 (14 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
98 students enrolled
Take This Course
  • Lectures 20
  • Length 1 hour
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works


Find online courses made by experts from around the world.


Take your courses with you and learn anywhere, anytime.


Learn and practice real-world skills and achieve your goals.

About This Course

Published 1/2015 English

Course Description

All courses may now be found at SUMURI.COM. This course will remain live in UDEMY for existing students.

Welcome to the Surviving Digital Forensics series. This series is focused on helping you become a better computer forensic examiner by teaching core computer forensic skills - all in about one hour. In this class you will learn how to image a Mac using only a Mac and freely available software. This will give you not only an additional imaging option but also provide you a solution for imaging Mac Fusion drives.

As with previous SDF classes you will learn by doing. The class begins with a brief overview of the issue at hand. Then we set up our forensic systems and off we go. Learning is hands on and we will use low cost and no cost computer forensic tools to do so.

Expert and novice computer forensic examiners alike will gain from this class. Since we are doing it the SDF way we are going to teach you real computer forensic skills that you can apply using our method or customize to meet your needs. We cover basic imaging as well as some additional options you may need such as, splitting an image, using different hash algorithms, imaging partitions and more.

Class Outline

1. Introduction and Welcome to the SDF series

2. What this class is all about

3. How to get the most of this class

4. The problem and the solution

5. Getting your forensic system setup

6. Imaging steps download

7. Turning off Disk Arbitration

8. Identifying your evidence in Terminal

9. Imaging with DCFLDD

10. Lock your DMG file

11. DCFLDD breakdown

12. Getting the DCFLDD version

13. Using different hash algorithms

14. Splitting your image

15. Changing the image file extensions of your image segments

16. Imaging partitions

17. Imaging Mac Fusion drives

18. Mac imaging quiz

18. Thank you & final thoughts

A Mac running OS 10.9+ is required for this course. If you are running 10.7 or 10.8 you likely will be okay, but a more up-to-date platform is recommended. The forensic tools we use are all freely available, so beyond your operating system all you need is the desire to become a better computer forensic examiner.

What are the requirements?

  • All you need is a Mac running OS 10.7+ (OS 10.10 recommended) and the desire to learn.

What am I going to get from this course?

  • Image a Mac using just a Mac and freely available tools
  • Learn how to install DCFLDD on a Mac
  • Learn how to use DCFLDD in Terminal
  • Image Mac Fusion drives
  • Apply different hashing algorithms to the imaging process
  • Create segmented image files
  • Target image partitions only

Who is the target audience?

  • Computer forensic analysts
  • IT professionals
  • Students

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.


Section 1: Introduction

Welcome to the Surviving Digital Forensics Series!


Let's talk about what this class is all about and what you will get out of it.


Here a few tips to get the most out of this training.


Let's look at the issue at hand and how we are going to solve it.

Section 2: Getting Set Up

In this lesson I will walk you through installing the freely available forensic tools we will be using.

Imaging Steps Download

How to mount your evidence storage disk after you turn Disk Arbitration off.

Section 3: Practicals

You may use Disk Arbitration as a software write block so long as you validate it! In this next section I go over the steps of turning off Disk Artbitration.


Since we are working in Terminal you need a way to identify your local disks from your evidence disks. This next sections walks you through the steps to do it.


Now let's get to it and create an image.


Remember to lock your DMG file to keep it in read only mode.


In this section I break down DCFLDD so you better understand the command. This comes in handy if you have to explain it.


Many examiners need to document the version of the tool they use. In this section I will show you how to identify the version of DCFLDD you are using.


MD5 is old fashion, let's adjust our command so we can hash using different algorithms and hash with multiple algorithms at once.


Next up is learning how to segment your image file. I will show you how to set it up and how to customize it.


In this module I will show you how to change the file extension of your segmented image file.


Sometimes you do not want to image the entire disk. Rather, you just need to image a certain partition on the disk. I show you how to do that next.


If you are imaging a Mac Fusion drive, or any Mac for that matter, an option is to place it into target disk mode and image it that way. In this section I will walk you through the steps.


This section teaches you how to image the pieces of a Mac Fusion drive and then reassemble them on a forensic Mac to be recombined into a new image file.

Mac Imaging Quiz
6 questions
Section 4: Conclusion

Thanks for joining me in another edition of the Surviving Digital Forensics series. I hope you enjoyed the class!

Check out other classes of the SDF series at

Follow me on Twitter @LeclairDF to get the latest happenings of the SDF series.

Check out our Blog at

Check out our Youtube channel

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Michael Leclair, Computer Forensic Analyst

Over twelve years of experience as a Computer Forensic Analyst, author and developer of computer forensic training and analysis tools. Specialties include: Windows forensics, Mac forensics, iOS forensics, Mac Server forensics & mobile device forensics. Creator of the "Surviving Digital Forensics" series and part of SUMURI's RECON for Mac OS X development team.

Certifications include: CFCE, CISSP, CCE, EnCE, A+, Network+

Regularly instruct law enforcement, government and corporate investigators both nationally and internationally in computer forensics.

Ready to start learning?
Take This Course