Digital Forensic Academy Five Day Course Agenda
Day One:
- Intro to Computer Forensics
- Interacting With Attorney’s & Clients
- Understanding the Role of an Expert Witness
- Electronic Discovery & Electronically Stored Information
- Ethics in Computer Forensics
- The Business of Computer Forensics
- Building a Forensic Lab
- The Forensic Process
- Anti-Forensics
- Forensic Image vs Backup
- Importance of Chain of Custody
- Documenting the Forensic Acquisition
- Understanding Write-Blockers
- Intro to Forensic Acquisition
- Types of Forensic Images
- Intro to Forensic Analysis
- Authoring Forensic Reports
Day Two:
The Operating System
- Understanding the Windows Operating System
- Understanding the Windows Registry
The File System:
- Understanding Files & File Signatures
- Understanding Compound Files
- Understanding Allocated Space of the Hard Drive
- Understanding Unallocated Space of the Hard Drive
- Understanding File Slack
- Understanding File Extensions to Identify Files (Mail, Docs, Spreadsheets)
- Understanding Meta Data
- Understanding EXIF Data
Storage Media
- Anatomy of a Hard Drive
- How Data is Stored on the Media
- How Data is Written to the Media
- How Data is Read from the Media
Forensic Tools
- Forensic Workstation Utility
- RIMTECH
- Encase Overview
- Forensic Tool Kit Overview
- Internet Evidence Finder Overview
- Discovery Attender
Understanding Cell Phone Technology
- Cellebrite Overview
- IEF Imager Overview
Day Three:
Intro to Computer Forensics
- Understanding Forensic Images
- Understanding Forensic Image Types
- Imaging vs Preview
- Creating a Forensic Image of a Windows Installed Hard Drive Using Encase
- Creating a New Case & Adding the Forensic Image to Encase
- Creating a Forensic Image of a Windows Installed Hard Drive Using Forensic Tool Kit
- Creating a New Case & Adding the Forensic Image to the Forensic Tool Kit
- Creating a Forensic Image of a Windows Installed Hard Drive Using Raptor
- Restoring an Image to a Hard Drive
- Searching for & Reviewing Graphic Images in Encase
- Creating a Forensic Image of a Windows Installed RAID5
- Creating a New Case & Adding the RAID5 Forensic Image to Encase
- Creating a Forensic Image of a Windows Installed Encrypted Hard Drive
- Creating a Forensic Image of an MAC OS Installed Hard Drive Using Macquisition
- Creating a Forensic Image of an IOS Device
- Creating a Forensic Image of Cell Phones
Day Four:
Overview of the Encase Forensic Software
- Reviewing Files & Placing Them in Order Based on Single or Multiple Keys
- Exporting Evidential Files Out of the Forensic Image
- Understanding & Applying Filters
- Mounting Files
- Recovering Lost Folders
- Analyzing File Signatures
- Searching Allocated & Unallocated Space
- Searching for & Recovering Graphic Images in the Unallocated Space
- Understanding the USBStor
- Understanding & Running Enscripts
- Understanding & Running Case Processor
Day Five:
Encase Forensic Analysis Continued
- Bookmarking Relevant Information
- Exporting Booked Marked Items
- Understanding & Finding File Shredding Signatures
- Creating & Exporting Encase Reports
Cellebrite
- Creating A Case
- Searching & Reviewing
- Creating Reports
Internet Evidence Finder
- Creating A Case
- Searching & Reviewing
- Creating Reports
Written Test
Practical Test