Certified Digital Forensics Examiner

Posted By: ELK1nG

Certified Digital Forensics Examiner
Last updated 12/2020
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.90 GB | Duration: 6h 18m

Updated Aug 2020

What you'll learn

After successfully completing this course, the students shall be able to:

Establish industry acceptable digital forensics standards

Learn the tools of trade

Comprehensively investigate the incident for digital evidence

Discover electronic evidence

Understand cellphone, computer and other digital forensics

Pass the CDFE certification exam

Requirements

The course requires the prospective candidates to have a minimum of one year of experience in the field related to digital forensics.

A good understanding and hands-on working knowledge of digital devices such as smartphones, tablets, personal computers and laptops is also required to completely understand the contents of this course.

Description

This is the updated version of the course (Updated Aug 2020)The Certified Digital Forensics Examiner (CDFE) is a vendor neutral certification offered by Mile2 for the aspiring cyber-crime fraud investigators. The course is based on the recommended curriculum for the same certification. The course enables the students to investigate, pursue litigation, provide proof of guilt, or take corrective measures based on the evidence collected through digital media.  The Certified Digital Forensic Examiner (CDFE) course is a comprehensive training course based on the official Mile2 certification exam curriculum. The course teaches the advanced concepts such as investigation of digital forensic incidents, usual ways to identify and discover anomalies in the stored data, data acquisition, forensic examination methods and smart devices investigation techniques. The course is ideal for the candidates willing to appear for the CDFE certification exam.  Exam Information    Upon completion, Certified Digital Forensics Examiner students will be able to establish industry acceptable digital forensics standards with current best practices and policies. Students will also be prepared to competently take the C)DFE exam. 

Overview

Section 1: Module 1 - Computer Forensics Incidents

Lecture 1 Computer Forensics Incidents

Lecture 2 Where are We?

Lecture 3 Overview

Lecture 4 Section 1: Origins of digital forensic science

Lecture 5 The Legal System

Lecture 6 The Legal System

Lecture 7 The Legal System

Lecture 8 The Legal System

Lecture 9 Section 2: Differences between criminal and civil incidents

Lecture 10 Criminal Incidents

Lecture 11 Criminal Incidents

Lecture 12 Criminal Incidents

Lecture 13 Criminal Incidents

Lecture 14 Criminal Incidents

Lecture 15 Criminal Incidents

Lecture 16 Criminal Incidents

Lecture 17 Civil Incidents

Lecture 18 Civil Incidents

Lecture 19 Civil Incidents

Lecture 20 Section 3: Types of computer fraud incidents

Lecture 21 Computer Fraud

Lecture 22 Computer Fraud

Lecture 23 Computer Fraud

Lecture 24 Computer Fraud

Lecture 25 Section 4: Internal and external threats

Lecture 26 Internal Threats

Lecture 27 Internal Threats

Lecture 28 External Threats

Lecture 29 External Threats

Lecture 30 External Threats

Lecture 31 External Threats

Lecture 32 Section 5: Investigative challenges

Lecture 33 Investigative Challenges

Lecture 34 Investigative Challenges

Lecture 35 Investigative Challenges

Lecture 36 Common Frame of Reference

Lecture 37 Media Volume

Lecture 38 Review

Section 2: Module 2 - Incident Handling

Lecture 39 Incident Handling

Lecture 40 Overview

Lecture 41 Section 1: What is an Incident?

Lecture 42 Incident Handling Defined

Lecture 43 What is a Security Event?

Lecture 44 Common Security Events of Interest

Lecture 45 What is a Security Incident?

Lecture 46 What is an Incident Response Plan?

Lecture 47 When does the Plan get Initiated?

Lecture 48 Common Goals of Incident Response Management

Lecture 49 Section 2: Incident Handling Steps

Lecture 50 Incident Handling Steps

Lecture 51 Phase 1: Preparation

Lecture 52 Goal

Lecture 53 Be Prepared

Lecture 54 The Incident Response Plan

Lecture 55 Incident Handling

Lecture 56 Incident Response Plan

Lecture 57 Incident Response Plan

Lecture 58 Incident Response Plan

Lecture 59 Roles of the Incident Response Team

Lecture 60 Incident Response Team Makeup

Lecture 61 Challenges of building an IRT

Lecture 62 Incident Response Training and Awareness

Lecture 63 Jump Kit

Lecture 64 Jump Kit

Lecture 65 Prepare Your Sites and Systems

Lecture 66 Prepare Your Sites and Systems

Lecture 67 Prepare Your Sites and Systems

Lecture 68 Prepare Your Sites and Systems

Lecture 69 Prepare Your Sites and Systems

Lecture 70 Prepare Your Sites and Systems

Lecture 71 Phase 2: Identification and Initial Response

Lecture 72 Goal

Lecture 73 Identification of an Incident

Lecture 74 Basic Incident Response Steps

Lecture 75 Proper Evidence Handling

Lecture 76 Phase 3: Containment

Lecture 77 Goal

Lecture 78 Containment

Lecture 79 Onsite Response

Lecture 80 Secure the Area

Lecture 81 Conduct Research

Lecture 82 Make Recommendations

Lecture 83 Establish Intervals

Lecture 84 Capture Digital Evidence

Lecture 85 Change Passwords

Lecture 86 Phase 4: Eradication

Lecture 87 Goal

Lecture 88 Determine Cause

Lecture 89 Defend Against Follow-on Attacks

Lecture 90 More Defenses

Lecture 91 Analyze Threat and Vulnerability

Lecture 92 Restore System(s) to Operation

Lecture 93 Phase 5: Recovery

Lecture 94 Goal

Lecture 95 Report Findings

Lecture 96 Restore System

Lecture 97 Verify

Lecture 98 Decide

Lecture 99 Monitor Systems

Lecture 100 Phase 6: Follow-up

Lecture 101 Goal

Lecture 102 Follow-up Report

Lecture 103 Follow-up Report

Lecture 104 Review

Section 3: Module 3 - Computer Forensic Investigative Theory

Lecture 105 Computer Forensic Investigative Theory

Lecture 106 Overview

Lecture 107 Section 1: Investigation Theory

Lecture 108 Computer Forensic Investigative Theory

Lecture 109 Computer Forensic Investigative Theory

Lecture 110 Computer Forensic Investigative Theory

Lecture 111 Computer Forensic Investigative Theory

Lecture 112 Computer Forensic Investigative Theory

Lecture 113 Computer Forensic Investigative Theory

Lecture 114 Section 2: Investigative Concepts

Lecture 115 Computer Forensic Investigative Theory

Lecture 116 Computer Forensic Investigative Theory

Lecture 117 Computer Forensic Investigative Theory

Lecture 118 Computer Forensic Investigative Theory

Lecture 119 Computer Forensic Investigative Theory

Lecture 120 Computer Forensic Investigative Theory

Lecture 121 Computer Forensic Investigative Theory

Lecture 122 Computer Forensic Investigative Theory

Lecture 123 Section 3: BEA & EFA

Lecture 124 Computer Forensic Investigative Theory

Lecture 125 Computer Forensic Investigative Theory

Lecture 126 Computer Forensic Investigative Theory

Lecture 127 Computer Forensic Investigative Theory

Lecture 128 Computer Forensic Investigative Theory

Lecture 129 Computer Forensic Investigative Theory

Lecture 130 Computer Forensic Investigative Theory

Lecture 131 Computer Forensic Investigative Theory

Lecture 132 Computer Forensic Investigative Theory

Lecture 133 Computer Forensic Investigative Theory

Lecture 134 Computer Forensic Investigative Theory

Lecture 135 Computer Forensic Investigative Theory

Lecture 136 McAfee Geotagging

Lecture 137 Review

Section 4: Module 4 - Investigative Process

Lecture 138 Investigative Process

Lecture 139 Overview

Lecture 140 Section 1: Investigation Prerequisites

Lecture 141 Prior to the Investigation

Lecture 142 Forensics Workstation

Lecture 143 Building Your Team of Investigators

Lecture 144 Who is involved in Computer Forensics?

Lecture 145 Who is involved in Computer Forensics?

Lecture 146 Approval Authority and Authorization

Lecture 147 Risk Assessment

Lecture 148 Forensic Investigation Toolkit

Lecture 149 Section 2: Investigation Process

Lecture 150 Investigating Computer Crimes

Lecture 151 Investigation Methodology

Lecture 152 Preparing for an Investigation

Lecture 153 Preparing for an Investigation (cont.)

Lecture 154 Preparing for an Investigation (cont.)

Lecture 155 Search Warrant

Lecture 156 Forensic Photography

Lecture 157 Preliminary Information

Lecture 158 First Responder

Lecture 159 Collecting Physical Evidence

Lecture 160 Collecting Electronic Evidence

Lecture 161 Collecting Electronic Evidence

Lecture 162 Collecting Electronic Evidence (cont.)

Lecture 163 Guideline for Acquiring Electronic Evidence

Lecture 164 Securing the Evidence

Lecture 165 Managing the Evidence

Lecture 166 Chain of Custody

Lecture 167 Duplicate the Data

Lecture 168 Verify the Integrity of the Image

Lecture 169 Recover Last Data

Lecture 170 Data Analysis

Lecture 171 Data Analysis Tools

Lecture 172 Assessing the Evidence

Lecture 173 Assessing the Case

Lecture 174 Assessing the Case (cont.)

Lecture 175 Location Assessment

Lecture 176 Best Practices

Lecture 177 Documentation

Lecture 178 Gathering and Organizing Information

Lecture 179 Writing the Report

Lecture 180 Writing the Report (cont.)

Lecture 181 Expert Witness

Lecture 182 Closing the Case

Lecture 183 Review

Section 5: Module 5 - Digital Acquisition & Analysis Tools

Lecture 184 Digital Acquisition & Analysis Tools

Lecture 185 Overview

Lecture 186 Section 1: Acquisition Procedures

Lecture 187 Digital Acquisition

Lecture 188 Digital Acquisition

Lecture 189 Digital Acquisition

Lecture 190 Digital Acquisition

Lecture 191 Digital Acquisition Procedures

Lecture 192 Digital Acquisition Procedures

Lecture 193 Digital Acquisition Procedures

Lecture 194 Digital Acquisition Procedures

Lecture 195 Digital Acquisition Procedures

Lecture 196 Digital Acquisition Procedures

Lecture 197 Digital Acquisition Procedures

Lecture 198 Digital Acquisition Procedures

Lecture 199 Digital Acquisition Procedures

Lecture 200 Digital Acquisition Procedures

Lecture 201 Digital Acquisition Procedures

Lecture 202 Digital Acquisition Procedures

Lecture 203 Digital Acquisition Procedures

Lecture 204 Section 2: Evidence Authentication

Lecture 205 Digital Acquisition Procedures

Lecture 206 Digital Acquisition

Lecture 207 Digital Acquisition Procedures

Lecture 208 Digital Acquisition Procedures

Lecture 209 Digital Acquisition Procedures

Lecture 210 Digital Acquisition Procedures

Lecture 211 Section 3: Tools

Lecture 212 Digital Acquisition Procedures

Lecture 213 Digital Forensic Analysis Tools

Lecture 214 Digital Forensic Analysis Tools

Lecture 215 Digital Forensic Analysis Tools

Lecture 216 Digital Forensic Analysis Tools

Lecture 217 Review

Section 6: Module 6 - Disks and Storages

Lecture 218 Disks and Storages

Lecture 219 Overview

Lecture 220 Section 1: Disk OS and FileSystems

Lecture 221 Disk Based Operating Systems

Lecture 222 Disk Based Operating Systems

Lecture 223 Disk Based Operating Systems

Lecture 224 Disk Based Operating Systems

Lecture 225 Disk Based Operating Systems

Lecture 226 OS / File Storage Concepts

Lecture 227 OS / File Storage Concepts

Lecture 228 OS / File Storage Concepts

Lecture 229 OS / File Storage Concepts

Lecture 230 OS / File Storage Concepts

Lecture 231 OS / File Storage Concepts

Lecture 232 Section 2: Spinning Disks Forensics

Lecture 233 Disk Storage Concepts

Lecture 234 Disk Storage Concepts

Lecture 235 Disk Storage Concepts

Lecture 236 Disk Storage Concepts

Lecture 237 Disk Storage Concepts

Lecture 238 Disk Storage Concepts

Lecture 239 Disk Storage Concepts

Lecture 240 Disk Storage Concepts

Lecture 241 Disk Storage Concepts

Lecture 242 File Carving

Lecture 243 Fragmentary Analysis

Lecture 244 Section 3: SSD Forensics

Lecture 245 Inside SSD

Lecture 246 Inside SSD

Lecture 247 TRIM

Lecture 248 Implications on Forensics

Lecture 249 Implications on Forensics

Lecture 250 Forensics vs Encryption

Lecture 251 Section 4: Files Management

Lecture 252 Disk Storage Concepts

Lecture 253 Disk Storage Concepts

Lecture 254 Disk Storage Concepts

Lecture 255 Disk Storage Concepts

Lecture 256 Disk Storage Concepts

Lecture 257 Disk Storage Concepts

Lecture 258 Disk Storage Concepts

Lecture 259 Quick View Plus

Lecture 260 Review

Section 7: Module 7 - Forensic Examination Protocols

Lecture 261 Forensic Examination Protocols

Lecture 262 Overview

Lecture 263 Section 1: Science Applied to Forensics

Lecture 264 Forensic Examination Protocols

Lecture 265 Forensic Examination Protocols

Lecture 266 Forensic Examination Protocols

Lecture 267 Forensic Examination Protocols

Lecture 268 Forensic Examination Protocols

Lecture 269 Section 2: Cardinal Rules & Alpha 5

Lecture 270 Forensic Examination

Lecture 271 Forensic Examination

Lecture 272 Forensic Examination

Lecture 273 Forensic Examination

Lecture 274 Forensic Examination

Lecture 275 Forensic Examination

Lecture 276 Forensic Examination

Lecture 277 Forensic Examination

Lecture 278 Forensic Examination

Lecture 279 Section 3: The 20 Basic Steps of Forensics

Lecture 280 Forensic Examination

Lecture 281 Forensic Examination

Lecture 282 Forensic Examination

Lecture 283 Forensic Examination

Lecture 284 Forensic Examination

Lecture 285 Forensic Examination

Lecture 286 Forensic Examination

Lecture 287 Forensic Examination

Lecture 288 Forensic Examination

Lecture 289 Forensic Examination

Lecture 290 Forensic Examination

Lecture 291 Forensic Examination

Lecture 292 Forensic Examination

Lecture 293 Review

Section 8: Module 8 - Digital Evidence Protocols

Lecture 294 Digital Evidence Protocols

Lecture 295 Overview

Lecture 296 Section 1: Digital Evidence Categories

Lecture 297 Digital Evidence Concepts

Lecture 298 Digital Evidence Concepts

Lecture 299 Digital Evidence Concepts

Lecture 300 Digital Evidence Categories

Lecture 301 Digital Evidence Categories

Lecture 302 Digital Evidence Categories

Lecture 303 Digital Evidence Categories

Lecture 304 Digital Evidence Categories

Lecture 305 Digital Evidence Categories

Lecture 306 Digital Evidence Categories

Lecture 307 Digital Evidence Categories

Lecture 308 Digital Evidence Categories

Lecture 309 Digital Evidence Categories

Lecture 310 Digital Evidence Categories

Lecture 311 Digital Evidence Categories

Lecture 312 Digital Evidence Categories

Lecture 313 Digital Evidence Categories

Lecture 314 Digital Evidence Categories

Lecture 315 Digital Evidence Categories

Lecture 316 Digital Evidence Categories

Lecture 317 Digital Evidence Categories

Lecture 318 Digital Evidence Categories

Lecture 319 Section 2: Evidence Admissibility

Lecture 320 Digital Evidence: Admissibility

Lecture 321 Digital Evidence: Admissibility

Lecture 322 Digital Evidence: Admissibility

Lecture 323 Review

Section 9: Module 9 - Digital Evidence Presentation

Lecture 324 Digital Evidence Presentation

Lecture 325 Overview

Lecture 326 Section 1: The Best Evidence Rule

Lecture 327 Digital Evidence Presentation

Lecture 328 Digital Evidence Presentation

Lecture 329 Digital Evidence Presentation

Lecture 330 Digital Evidence Presentation

Lecture 331 Digital Evidence Presentation

Lecture 332 Digital Evidence Presentation

Lecture 333 Digital Evidence Presentation

Lecture 334 Digital Evidence

Lecture 335 Digital Evidence

Lecture 336 Digital Evidence

Lecture 337 Digital Evidence

Lecture 338 Digital Evidence

Lecture 339 Section 2: Hearsay

Lecture 340 Digital Evidence: Hearsay

Lecture 341 Digital Evidence: Hearsay

Lecture 342 Digital Evidence: Hearsay

Lecture 343 Digital Evidence: Hearsay

Lecture 344 Section 3: Authenticity and Alteration

Lecture 345 Digital Evidence

Lecture 346 Digital Evidence

Lecture 347 Digital Evidence

Lecture 348 Digital Evidence

Lecture 349 Digital Evidence

Lecture 350 Digital Evidence

Lecture 351 Review

Section 10: Module 10 - Computer Forensic Laboratory Protocols

Lecture 352 Computer Forensic Laboratory Protocols

Lecture 353 Overview

Lecture 354 Overview

Lecture 355 Overview

Lecture 356 Quality Assurance

Lecture 357 Quality Assurance

Lecture 358 Standard Operating Procedures

Lecture 359 Reports

Lecture 360 Peer Review

Lecture 361 Who Should Review?

Lecture 362 Peer Review

Lecture 363 Consistency

Lecture 364 Accuracy

Lecture 365 Research

Lecture 366 Validation

Lecture 367 Relevance

Lecture 368 Peer Review

Lecture 369 Peer Review

Lecture 370 Annual Review

Lecture 371 Deviation

Lecture 372 Deviation

Lecture 373 Deviation

Lecture 374 Deviation

Lecture 375 Lab Intake

Lecture 376 Lab Intake

Lecture 377 Lab Intake

Lecture 378 Tracking

Lecture 379 Tracking

Lecture 380 Storage

Lecture 381 Storage

Lecture 382 Discovery

Lecture 383 Discovery

Lecture 384 Discovery

Lecture 385 Discovery

Lecture 386 Discovery

Lecture 387 Review

Section 11: Module 11 - Computer Forensic Processing Techniques

Lecture 388 Computer Forensic Processing Techniques

Lecture 389 Overview

Lecture 390 Computer Forensic Processing Techniques

Lecture 391 Computer Forensic Processing Techniques

Lecture 392 Computer Forensic Processing Techniques

Lecture 393 Computer Forensic Processing Techniques

Lecture 394 Computer Forensic Processing Techniques

Lecture 395 Computer Forensic Processing Techniques

Lecture 396 Computer Forensic Processing Techniques

Lecture 397 Computer Forensic Processing Techniques

Lecture 398 Computer Forensic Processing Techniques

Lecture 399 Computer Forensic Processing Techniques

Lecture 400 Computer Forensic Processing Techniques

Lecture 401 Computer Forensic Processing Techniques

Lecture 402 Computer Forensic Processing Techniques

Lecture 403 Computer Forensic Processing Techniques

Lecture 404 Computer Forensic Processing Techniques

Lecture 405 Computer Forensic Processing Techniques

Lecture 406 Computer Forensic Processing Techniques

Lecture 407 Computer Forensic Processing Techniques

Lecture 408 Computer Forensic Processing Techniques

Lecture 409 Computer Forensic Processing Techniques

Lecture 410 Computer Forensic Processing Techniques

Lecture 411 Computer Forensic Processing Techniques

Lecture 412 Computer Forensic Processing Techniques

Lecture 413 Computer Forensic Processing Techniques

Lecture 414 Computer Forensic Processing Techniques

Lecture 415 Computer Forensic Processing Techniques

Lecture 416 Computer Forensic Processing Techniques

Lecture 417 Computer Forensic Processing Techniques

Lecture 418 National Software Reference Library (NSRL)

Lecture 419 Computer Forensic Processing Techniques

Lecture 420 Computer Forensic Processing Techniques

Lecture 421 Computer Forensic Processing Techniques

Lecture 422 Computer Forensic Processing Techniques

Lecture 423 Computer Forensic Processing Techniques

Lecture 424 Computer Forensic Processing Techniques

Lecture 425 Computer Forensic Processing Techniques

Lecture 426 Computer Forensic Processing Techniques

Lecture 427 Computer Forensic Processing Techniques

Lecture 428 Computer Forensic Processing Techniques

Lecture 429 Computer Forensic Processing Techniques

Lecture 430 Computer Forensic Processing Techniques

Lecture 431 Computer Forensic Processing Techniques

Lecture 432 Computer Forensic Processing Techniques

Lecture 433 Review

Section 12: Module 12 - Specialized Artifact Recovery

Lecture 434 Specialized Artifact Recovery

Lecture 435 Overview

Lecture 436 Section 1: Forensics Workstation Prep

Lecture 437 Forensics Workstation Prep

Lecture 438 Forensics Workstation Prep

Lecture 439 Forensics Workstation Prep

Lecture 440 Forensics Workstation Prep

Lecture 441 Forensics Workstation Prep

Lecture 442 Settings For The Nodrivetypeautorun Registry Entry

Lecture 443 Prep System Stage

Lecture 444 Prep System Stage

Lecture 445 Prep System Stage

Lecture 446 Section 2: Windows Components with Investigative Interest

Lecture 447 Windows Components with Investigative Interest

Lecture 448 Types of Dates

Lecture 449 File Signatures

Lecture 450 File Signatures

Lecture 451 File Signatures

Lecture 452 File Signatures

Lecture 453 Image File Databases

Lecture 454 Image File Databases

Lecture 455 The Windows OS

Lecture 456 Windows Operating Environment

Lecture 457 Windows Registry

Lecture 458 Windows Registry

Lecture 459 Windows Registry Hives

Lecture 460 Windows Registry Hives

Lecture 461 Windows Registry Hives

Lecture 462 Windows Registry Hives

Lecture 463 Windows Registry Hives

Lecture 464 Windows NT/2000/XP Registry

Lecture 465 Windows Vista/Win7, 8, 10 Registry

Lecture 466 Windows Alternate Data Streams

Lecture 467 Windows Alternate Data Streams

Lecture 468 Windows Unique ID Numbers

Lecture 469 Windows Unique ID Numbers

Lecture 470 Other ID’s

Lecture 471 Section 3: Files Containing Historical Information

Lecture 472 Historical Files

Lecture 473 Historical Files

Lecture 474 Historical Files

Lecture 475 Historical Files

Lecture 476 Historical Files

Lecture 477 Splunk

Lecture 478 Historical Files

Lecture 479 Historical Files

Lecture 480 Event Viewer

Lecture 481 Historical Files

Lecture 482 Historical Files

Lecture 483 Historical Files

Lecture 484 Historical Files

Lecture 485 Historical Files

Lecture 486 Historical Files

Lecture 487 Historical Files

Lecture 488 Historical Files

Lecture 489 Historical Files

Lecture 490 Historical Files

Lecture 491 Historical Files

Lecture 492 Historical Files

Lecture 493 Historical Files

Lecture 494 Historical Files

Lecture 495 Outlook E-Mail

Lecture 496 Outlook E-Mail

Lecture 497 Web E-Mail

Lecture 498 Section 4: Web Forensics

Lecture 499 Web Forensics

Lecture 500 Historical Files

Lecture 501 IE database location

Lecture 502 Mozilla Firefox SQLite database

Lecture 503 Google Chrome

Lecture 504 Microsoft Edge

Lecture 505 Understanding The Database Files

Lecture 506 Understanding The Database Files

Lecture 507 Investigating SQLite Files

Lecture 508 Investigating SQLite Files

Lecture 509 Investigating SQLite Files

Lecture 510 Tables Relation

Lecture 511 Tables Relation

Lecture 512 Viewing Visited Websites

Lecture 513 Review

Section 13: Module 13 - Electronic Discovery and Electronically Stored Information

Lecture 514 Electronic Discovery and Electronically Stored Information

Lecture 515 Overview

Lecture 516 eDiscovery

Lecture 517 eDiscovery

Lecture 518 Discoverable ESI Material

Lecture 519 Discoverable ESI Material

Lecture 520 eDiscovery Notification

Lecture 521 Required Disclosure

Lecture 522 eDiscovery Conference

Lecture 523 Preserving Information

Lecture 524 eDiscovery Liaison

Lecture 525 eDiscovery Products

Lecture 526 Metadata

Lecture 527 What is Metadata?

Lecture 528 Data Retention Architecture

Lecture 529 “Safe Harbor” Rule 37(f)

Lecture 530 eDiscovery Spoliation

Lecture 531 Tools for eDiscovery

Lecture 532 Review

Section 14: Module 14 - Mobile Forensics

Lecture 533 Mobile Forensics

Lecture 534 Overview

Lecture 535 Section 1: Cellular Network

Lecture 536 Mobile Devices

Lecture 537 Types of Cell Networks

Lecture 538 What can a criminal do with Cell Phones?

Lecture 539 Cell Phone Forensics

Lecture 540 Forensics Information in Cell Phones

Lecture 541 Subscriber Identity Module (SIM)

Lecture 542 Integrated Circuit Card Identification (ICCID)

Lecture 543 International Mobile Equipment Identifier (IMEI)

Lecture 544 Electronic Seal Number (ESN)

Lecture 545 Section 2: Forensic Process

Lecture 546 Device Seizure

Lecture 547 Device Seizure

Lecture 548 Device Seizure

Lecture 549 Acquisition

Lecture 550 Data Acquisition

Lecture 551 Acquire Data from SIM Cards

Lecture 552 SIM Cards

Lecture 553 Mobile Device Memory

Lecture 554 Data Analysis

Lecture 555 Reality

Lecture 556 Analyze Information

Lecture 557 Analyze

Lecture 558 Non-Invasive Forensics

Lecture 559 Non-Invasive Methods

Lecture 560 Invasive Methods

Lecture 561 Forensic Methods

Lecture 562 Section 3: Tools

Lecture 563 Cell Phone Forensic Tools

Lecture 564 Device and SIM Card Seizure

Lecture 565 Cell Phone Analyzer

Lecture 566 Tools

Lecture 567 Forensic Card Reader

Lecture 568 ForensicSIM Tool

Lecture 569 Forensic Challenges

Lecture 570 Section 4: Paraben Forensics

Lecture 571 Paraben Mobile Field Kit

Lecture 572 Paraben Forensics Hardware

Lecture 573 Paraben: Power Bank

Lecture 574 Paraben: Mobile Field Kit

Lecture 575 Paraben: Wireless Stronghold Tent

Lecture 576 Paraben: Passport Stronghold Bag

Lecture 577 Paraben: Project-a-phone

Lecture 578 Paraben: Project-a-phone

Lecture 579 Paraben: SIM Card Seizure

Lecture 580 Paraben: Sticks

Lecture 581 Paraben: P2C-P2 Commander

Lecture 582 Review

Section 15: Module 15 - Digital Forensics Reporting

Lecture 583 Digital Forensics Reporting

Lecture 584 Overview

Lecture 585 Analysis Report

Lecture 586 Definition

Lecture 587 Computer Sciences

Lecture 588 Ten Laws of Good Report Writing

Lecture 589 Cover Page

Lecture 590 Table of Contents

Lecture 591 Examination Report

Lecture 592 Background

Lecture 593 Request

Lecture 594 Summary of Findings

Lecture 595 Forensic Examination

Lecture 596 Tools

Lecture 597 Evidence

Lecture 598 Items of Evidence

Lecture 599 Analysis

Lecture 600 Findings

Lecture 601 Conclusion

Lecture 602 Exhibits

Lecture 603 Signatures

Lecture 604 Review

Digital security experts working in law-enforcement agencies,IT security managers,Law enforcement agents or police officers,Digital forensic experts,Attorneys,Data owners