Find online courses made by experts from around the world.
Take your courses with you and learn anywhere, anytime.
Learn and practice real-world skills and achieve your goals.
Welcome to the Surviving Digital Forensics series. Oftentimes you will be asked to find information on a target system that shows if a user accessed certain files, the last time they did and/ or how often they did. Being able to put a picture together that answers these questions can be critical and make or break the case. In this course you will learn one method that can be used to answer these questions. Of course we will be using all low cost or no cost computer forensic tools. The course is focused on just what you need and you will be up and running in under an hour.
As with previous SDF classes you will learn by doing. The class begins with a brief overview of the method we will be using and then it is all hands on. There are three practicals in which you work with our prepared files in applying the technique as well as questions to answer about each scenario.
Not for you? No problem.
30 day money back guarantee.
Learn on the go.
Desktop, iOS and Android.
Certificate of completion.
|Section 1: Welcome & Introuction|
Welcome to Surviving Digital Forensics!
|Section 2: About Windows Explorer Evidence|
Let's begin with an overview of what we will be talking about, IE History artifacts. This background information will help you better understand what we are doing in the practicals.
|Section 3: Practicals|
Just relax for this one while I go over how to set up your evidence and load it into the forensic tool.
Practical 02: External Media
Practical 02 Quiz
Let's see how you did. In this module I go over practical #2.
Practical 03: Hidden Directories
Practical 03 Quiz
Let's see how you did with this one. This module goes over practical #3.
|Section 4: Conclusion|
I hope you enjoyed the class!
Check out other classes of the SDF series at http://sumuri.com/training/surviving-digital-forensics/
Follow me on Twitter @LeclairDF to get the latest happenings of the SDF series.
Check out our Blog at http://sumuri.com/about/news/
Check out our Youtube channel https://www.youtube.com/user/SumuriNews
Over twelve years of experience as a Computer Forensic Analyst, author and developer of computer forensic training and analysis tools. Specialties include: Windows forensics, Mac forensics, iOS forensics, Mac Server forensics & mobile device forensics. Creator of the "Surviving Digital Forensics" series and part of SUMURI's RECON for Mac OS X development team.
Certifications include: CFCE, CISSP, CCE, EnCE, A+, Network+
Regularly instruct law enforcement, government and corporate investigators both nationally and internationally in computer forensics.