Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Certified Digital Forensics Examiner

    Posted By: ELK1nG
    Certified Digital Forensics Examiner

    Certified Digital Forensics Examiner
    Last updated 12/2020
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 1.90 GB | Duration: 6h 18m

    Updated Aug 2020

    What you'll learn

    After successfully completing this course, the students shall be able to:

    Establish industry acceptable digital forensics standards

    Learn the tools of trade

    Comprehensively investigate the incident for digital evidence

    Discover electronic evidence

    Understand cellphone, computer and other digital forensics

    Pass the CDFE certification exam

    Requirements

    The course requires the prospective candidates to have a minimum of one year of experience in the field related to digital forensics.

    A good understanding and hands-on working knowledge of digital devices such as smartphones, tablets, personal computers and laptops is also required to completely understand the contents of this course.

    Description

    This is the updated version of the course (Updated Aug 2020)The Certified Digital Forensics Examiner (CDFE) is a vendor neutral certification offered by Mile2 for the aspiring cyber-crime fraud investigators. The course is based on the recommended curriculum for the same certification. The course enables the students to investigate, pursue litigation, provide proof of guilt, or take corrective measures based on the evidence collected through digital media.  The Certified Digital Forensic Examiner (CDFE) course is a comprehensive training course based on the official Mile2 certification exam curriculum. The course teaches the advanced concepts such as investigation of digital forensic incidents, usual ways to identify and discover anomalies in the stored data, data acquisition, forensic examination methods and smart devices investigation techniques. The course is ideal for the candidates willing to appear for the CDFE certification exam.  Exam Information    Upon completion, Certified Digital Forensics Examiner students will be able to establish industry acceptable digital forensics standards with current best practices and policies. Students will also be prepared to competently take the C)DFE exam. 

    Overview

    Section 1: Module 1 - Computer Forensics Incidents

    Lecture 1 Computer Forensics Incidents

    Lecture 2 Where are We?

    Lecture 3 Overview

    Lecture 4 Section 1: Origins of digital forensic science

    Lecture 5 The Legal System

    Lecture 6 The Legal System

    Lecture 7 The Legal System

    Lecture 8 The Legal System

    Lecture 9 Section 2: Differences between criminal and civil incidents

    Lecture 10 Criminal Incidents

    Lecture 11 Criminal Incidents

    Lecture 12 Criminal Incidents

    Lecture 13 Criminal Incidents

    Lecture 14 Criminal Incidents

    Lecture 15 Criminal Incidents

    Lecture 16 Criminal Incidents

    Lecture 17 Civil Incidents

    Lecture 18 Civil Incidents

    Lecture 19 Civil Incidents

    Lecture 20 Section 3: Types of computer fraud incidents

    Lecture 21 Computer Fraud

    Lecture 22 Computer Fraud

    Lecture 23 Computer Fraud

    Lecture 24 Computer Fraud

    Lecture 25 Section 4: Internal and external threats

    Lecture 26 Internal Threats

    Lecture 27 Internal Threats

    Lecture 28 External Threats

    Lecture 29 External Threats

    Lecture 30 External Threats

    Lecture 31 External Threats

    Lecture 32 Section 5: Investigative challenges

    Lecture 33 Investigative Challenges

    Lecture 34 Investigative Challenges

    Lecture 35 Investigative Challenges

    Lecture 36 Common Frame of Reference

    Lecture 37 Media Volume

    Lecture 38 Review

    Section 2: Module 2 - Incident Handling

    Lecture 39 Incident Handling

    Lecture 40 Overview

    Lecture 41 Section 1: What is an Incident?

    Lecture 42 Incident Handling Defined

    Lecture 43 What is a Security Event?

    Lecture 44 Common Security Events of Interest

    Lecture 45 What is a Security Incident?

    Lecture 46 What is an Incident Response Plan?

    Lecture 47 When does the Plan get Initiated?

    Lecture 48 Common Goals of Incident Response Management

    Lecture 49 Section 2: Incident Handling Steps

    Lecture 50 Incident Handling Steps

    Lecture 51 Phase 1: Preparation

    Lecture 52 Goal

    Lecture 53 Be Prepared

    Lecture 54 The Incident Response Plan

    Lecture 55 Incident Handling

    Lecture 56 Incident Response Plan

    Lecture 57 Incident Response Plan

    Lecture 58 Incident Response Plan

    Lecture 59 Roles of the Incident Response Team

    Lecture 60 Incident Response Team Makeup

    Lecture 61 Challenges of building an IRT

    Lecture 62 Incident Response Training and Awareness

    Lecture 63 Jump Kit

    Lecture 64 Jump Kit

    Lecture 65 Prepare Your Sites and Systems

    Lecture 66 Prepare Your Sites and Systems

    Lecture 67 Prepare Your Sites and Systems

    Lecture 68 Prepare Your Sites and Systems

    Lecture 69 Prepare Your Sites and Systems

    Lecture 70 Prepare Your Sites and Systems

    Lecture 71 Phase 2: Identification and Initial Response

    Lecture 72 Goal

    Lecture 73 Identification of an Incident

    Lecture 74 Basic Incident Response Steps

    Lecture 75 Proper Evidence Handling

    Lecture 76 Phase 3: Containment

    Lecture 77 Goal

    Lecture 78 Containment

    Lecture 79 Onsite Response

    Lecture 80 Secure the Area

    Lecture 81 Conduct Research

    Lecture 82 Make Recommendations

    Lecture 83 Establish Intervals

    Lecture 84 Capture Digital Evidence

    Lecture 85 Change Passwords

    Lecture 86 Phase 4: Eradication

    Lecture 87 Goal

    Lecture 88 Determine Cause

    Lecture 89 Defend Against Follow-on Attacks

    Lecture 90 More Defenses

    Lecture 91 Analyze Threat and Vulnerability

    Lecture 92 Restore System(s) to Operation

    Lecture 93 Phase 5: Recovery

    Lecture 94 Goal

    Lecture 95 Report Findings

    Lecture 96 Restore System

    Lecture 97 Verify

    Lecture 98 Decide

    Lecture 99 Monitor Systems

    Lecture 100 Phase 6: Follow-up

    Lecture 101 Goal

    Lecture 102 Follow-up Report

    Lecture 103 Follow-up Report

    Lecture 104 Review

    Section 3: Module 3 - Computer Forensic Investigative Theory

    Lecture 105 Computer Forensic Investigative Theory

    Lecture 106 Overview

    Lecture 107 Section 1: Investigation Theory

    Lecture 108 Computer Forensic Investigative Theory

    Lecture 109 Computer Forensic Investigative Theory

    Lecture 110 Computer Forensic Investigative Theory

    Lecture 111 Computer Forensic Investigative Theory

    Lecture 112 Computer Forensic Investigative Theory

    Lecture 113 Computer Forensic Investigative Theory

    Lecture 114 Section 2: Investigative Concepts

    Lecture 115 Computer Forensic Investigative Theory

    Lecture 116 Computer Forensic Investigative Theory

    Lecture 117 Computer Forensic Investigative Theory

    Lecture 118 Computer Forensic Investigative Theory

    Lecture 119 Computer Forensic Investigative Theory

    Lecture 120 Computer Forensic Investigative Theory

    Lecture 121 Computer Forensic Investigative Theory

    Lecture 122 Computer Forensic Investigative Theory

    Lecture 123 Section 3: BEA & EFA

    Lecture 124 Computer Forensic Investigative Theory

    Lecture 125 Computer Forensic Investigative Theory

    Lecture 126 Computer Forensic Investigative Theory

    Lecture 127 Computer Forensic Investigative Theory

    Lecture 128 Computer Forensic Investigative Theory

    Lecture 129 Computer Forensic Investigative Theory

    Lecture 130 Computer Forensic Investigative Theory

    Lecture 131 Computer Forensic Investigative Theory

    Lecture 132 Computer Forensic Investigative Theory

    Lecture 133 Computer Forensic Investigative Theory

    Lecture 134 Computer Forensic Investigative Theory

    Lecture 135 Computer Forensic Investigative Theory

    Lecture 136 McAfee Geotagging

    Lecture 137 Review

    Section 4: Module 4 - Investigative Process

    Lecture 138 Investigative Process

    Lecture 139 Overview

    Lecture 140 Section 1: Investigation Prerequisites

    Lecture 141 Prior to the Investigation

    Lecture 142 Forensics Workstation

    Lecture 143 Building Your Team of Investigators

    Lecture 144 Who is involved in Computer Forensics?

    Lecture 145 Who is involved in Computer Forensics?

    Lecture 146 Approval Authority and Authorization

    Lecture 147 Risk Assessment

    Lecture 148 Forensic Investigation Toolkit

    Lecture 149 Section 2: Investigation Process

    Lecture 150 Investigating Computer Crimes

    Lecture 151 Investigation Methodology

    Lecture 152 Preparing for an Investigation

    Lecture 153 Preparing for an Investigation (cont.)

    Lecture 154 Preparing for an Investigation (cont.)

    Lecture 155 Search Warrant

    Lecture 156 Forensic Photography

    Lecture 157 Preliminary Information

    Lecture 158 First Responder

    Lecture 159 Collecting Physical Evidence

    Lecture 160 Collecting Electronic Evidence

    Lecture 161 Collecting Electronic Evidence

    Lecture 162 Collecting Electronic Evidence (cont.)

    Lecture 163 Guideline for Acquiring Electronic Evidence

    Lecture 164 Securing the Evidence

    Lecture 165 Managing the Evidence

    Lecture 166 Chain of Custody

    Lecture 167 Duplicate the Data

    Lecture 168 Verify the Integrity of the Image

    Lecture 169 Recover Last Data

    Lecture 170 Data Analysis

    Lecture 171 Data Analysis Tools

    Lecture 172 Assessing the Evidence

    Lecture 173 Assessing the Case

    Lecture 174 Assessing the Case (cont.)

    Lecture 175 Location Assessment

    Lecture 176 Best Practices

    Lecture 177 Documentation

    Lecture 178 Gathering and Organizing Information

    Lecture 179 Writing the Report

    Lecture 180 Writing the Report (cont.)

    Lecture 181 Expert Witness

    Lecture 182 Closing the Case

    Lecture 183 Review

    Section 5: Module 5 - Digital Acquisition & Analysis Tools

    Lecture 184 Digital Acquisition & Analysis Tools

    Lecture 185 Overview

    Lecture 186 Section 1: Acquisition Procedures

    Lecture 187 Digital Acquisition

    Lecture 188 Digital Acquisition

    Lecture 189 Digital Acquisition

    Lecture 190 Digital Acquisition

    Lecture 191 Digital Acquisition Procedures

    Lecture 192 Digital Acquisition Procedures

    Lecture 193 Digital Acquisition Procedures

    Lecture 194 Digital Acquisition Procedures

    Lecture 195 Digital Acquisition Procedures

    Lecture 196 Digital Acquisition Procedures

    Lecture 197 Digital Acquisition Procedures

    Lecture 198 Digital Acquisition Procedures

    Lecture 199 Digital Acquisition Procedures

    Lecture 200 Digital Acquisition Procedures

    Lecture 201 Digital Acquisition Procedures

    Lecture 202 Digital Acquisition Procedures

    Lecture 203 Digital Acquisition Procedures

    Lecture 204 Section 2: Evidence Authentication

    Lecture 205 Digital Acquisition Procedures

    Lecture 206 Digital Acquisition

    Lecture 207 Digital Acquisition Procedures

    Lecture 208 Digital Acquisition Procedures

    Lecture 209 Digital Acquisition Procedures

    Lecture 210 Digital Acquisition Procedures

    Lecture 211 Section 3: Tools

    Lecture 212 Digital Acquisition Procedures

    Lecture 213 Digital Forensic Analysis Tools

    Lecture 214 Digital Forensic Analysis Tools

    Lecture 215 Digital Forensic Analysis Tools

    Lecture 216 Digital Forensic Analysis Tools

    Lecture 217 Review

    Section 6: Module 6 - Disks and Storages

    Lecture 218 Disks and Storages

    Lecture 219 Overview

    Lecture 220 Section 1: Disk OS and FileSystems

    Lecture 221 Disk Based Operating Systems

    Lecture 222 Disk Based Operating Systems

    Lecture 223 Disk Based Operating Systems

    Lecture 224 Disk Based Operating Systems

    Lecture 225 Disk Based Operating Systems

    Lecture 226 OS / File Storage Concepts

    Lecture 227 OS / File Storage Concepts

    Lecture 228 OS / File Storage Concepts

    Lecture 229 OS / File Storage Concepts

    Lecture 230 OS / File Storage Concepts

    Lecture 231 OS / File Storage Concepts

    Lecture 232 Section 2: Spinning Disks Forensics

    Lecture 233 Disk Storage Concepts

    Lecture 234 Disk Storage Concepts

    Lecture 235 Disk Storage Concepts

    Lecture 236 Disk Storage Concepts

    Lecture 237 Disk Storage Concepts

    Lecture 238 Disk Storage Concepts

    Lecture 239 Disk Storage Concepts

    Lecture 240 Disk Storage Concepts

    Lecture 241 Disk Storage Concepts

    Lecture 242 File Carving

    Lecture 243 Fragmentary Analysis

    Lecture 244 Section 3: SSD Forensics

    Lecture 245 Inside SSD

    Lecture 246 Inside SSD

    Lecture 247 TRIM

    Lecture 248 Implications on Forensics

    Lecture 249 Implications on Forensics

    Lecture 250 Forensics vs Encryption

    Lecture 251 Section 4: Files Management

    Lecture 252 Disk Storage Concepts

    Lecture 253 Disk Storage Concepts

    Lecture 254 Disk Storage Concepts

    Lecture 255 Disk Storage Concepts

    Lecture 256 Disk Storage Concepts

    Lecture 257 Disk Storage Concepts

    Lecture 258 Disk Storage Concepts

    Lecture 259 Quick View Plus

    Lecture 260 Review

    Section 7: Module 7 - Forensic Examination Protocols

    Lecture 261 Forensic Examination Protocols

    Lecture 262 Overview

    Lecture 263 Section 1: Science Applied to Forensics

    Lecture 264 Forensic Examination Protocols

    Lecture 265 Forensic Examination Protocols

    Lecture 266 Forensic Examination Protocols

    Lecture 267 Forensic Examination Protocols

    Lecture 268 Forensic Examination Protocols

    Lecture 269 Section 2: Cardinal Rules & Alpha 5

    Lecture 270 Forensic Examination

    Lecture 271 Forensic Examination

    Lecture 272 Forensic Examination

    Lecture 273 Forensic Examination

    Lecture 274 Forensic Examination

    Lecture 275 Forensic Examination

    Lecture 276 Forensic Examination

    Lecture 277 Forensic Examination

    Lecture 278 Forensic Examination

    Lecture 279 Section 3: The 20 Basic Steps of Forensics

    Lecture 280 Forensic Examination

    Lecture 281 Forensic Examination

    Lecture 282 Forensic Examination

    Lecture 283 Forensic Examination

    Lecture 284 Forensic Examination

    Lecture 285 Forensic Examination

    Lecture 286 Forensic Examination

    Lecture 287 Forensic Examination

    Lecture 288 Forensic Examination

    Lecture 289 Forensic Examination

    Lecture 290 Forensic Examination

    Lecture 291 Forensic Examination

    Lecture 292 Forensic Examination

    Lecture 293 Review

    Section 8: Module 8 - Digital Evidence Protocols

    Lecture 294 Digital Evidence Protocols

    Lecture 295 Overview

    Lecture 296 Section 1: Digital Evidence Categories

    Lecture 297 Digital Evidence Concepts

    Lecture 298 Digital Evidence Concepts

    Lecture 299 Digital Evidence Concepts

    Lecture 300 Digital Evidence Categories

    Lecture 301 Digital Evidence Categories

    Lecture 302 Digital Evidence Categories

    Lecture 303 Digital Evidence Categories

    Lecture 304 Digital Evidence Categories

    Lecture 305 Digital Evidence Categories

    Lecture 306 Digital Evidence Categories

    Lecture 307 Digital Evidence Categories

    Lecture 308 Digital Evidence Categories

    Lecture 309 Digital Evidence Categories

    Lecture 310 Digital Evidence Categories

    Lecture 311 Digital Evidence Categories

    Lecture 312 Digital Evidence Categories

    Lecture 313 Digital Evidence Categories

    Lecture 314 Digital Evidence Categories

    Lecture 315 Digital Evidence Categories

    Lecture 316 Digital Evidence Categories

    Lecture 317 Digital Evidence Categories

    Lecture 318 Digital Evidence Categories

    Lecture 319 Section 2: Evidence Admissibility

    Lecture 320 Digital Evidence: Admissibility

    Lecture 321 Digital Evidence: Admissibility

    Lecture 322 Digital Evidence: Admissibility

    Lecture 323 Review

    Section 9: Module 9 - Digital Evidence Presentation

    Lecture 324 Digital Evidence Presentation

    Lecture 325 Overview

    Lecture 326 Section 1: The Best Evidence Rule

    Lecture 327 Digital Evidence Presentation

    Lecture 328 Digital Evidence Presentation

    Lecture 329 Digital Evidence Presentation

    Lecture 330 Digital Evidence Presentation

    Lecture 331 Digital Evidence Presentation

    Lecture 332 Digital Evidence Presentation

    Lecture 333 Digital Evidence Presentation

    Lecture 334 Digital Evidence

    Lecture 335 Digital Evidence

    Lecture 336 Digital Evidence

    Lecture 337 Digital Evidence

    Lecture 338 Digital Evidence

    Lecture 339 Section 2: Hearsay

    Lecture 340 Digital Evidence: Hearsay

    Lecture 341 Digital Evidence: Hearsay

    Lecture 342 Digital Evidence: Hearsay

    Lecture 343 Digital Evidence: Hearsay

    Lecture 344 Section 3: Authenticity and Alteration

    Lecture 345 Digital Evidence

    Lecture 346 Digital Evidence

    Lecture 347 Digital Evidence

    Lecture 348 Digital Evidence

    Lecture 349 Digital Evidence

    Lecture 350 Digital Evidence

    Lecture 351 Review

    Section 10: Module 10 - Computer Forensic Laboratory Protocols

    Lecture 352 Computer Forensic Laboratory Protocols

    Lecture 353 Overview

    Lecture 354 Overview

    Lecture 355 Overview

    Lecture 356 Quality Assurance

    Lecture 357 Quality Assurance

    Lecture 358 Standard Operating Procedures

    Lecture 359 Reports

    Lecture 360 Peer Review

    Lecture 361 Who Should Review?

    Lecture 362 Peer Review

    Lecture 363 Consistency

    Lecture 364 Accuracy

    Lecture 365 Research

    Lecture 366 Validation

    Lecture 367 Relevance

    Lecture 368 Peer Review

    Lecture 369 Peer Review

    Lecture 370 Annual Review

    Lecture 371 Deviation

    Lecture 372 Deviation

    Lecture 373 Deviation

    Lecture 374 Deviation

    Lecture 375 Lab Intake

    Lecture 376 Lab Intake

    Lecture 377 Lab Intake

    Lecture 378 Tracking

    Lecture 379 Tracking

    Lecture 380 Storage

    Lecture 381 Storage

    Lecture 382 Discovery

    Lecture 383 Discovery

    Lecture 384 Discovery

    Lecture 385 Discovery

    Lecture 386 Discovery

    Lecture 387 Review

    Section 11: Module 11 - Computer Forensic Processing Techniques

    Lecture 388 Computer Forensic Processing Techniques

    Lecture 389 Overview

    Lecture 390 Computer Forensic Processing Techniques

    Lecture 391 Computer Forensic Processing Techniques

    Lecture 392 Computer Forensic Processing Techniques

    Lecture 393 Computer Forensic Processing Techniques

    Lecture 394 Computer Forensic Processing Techniques

    Lecture 395 Computer Forensic Processing Techniques

    Lecture 396 Computer Forensic Processing Techniques

    Lecture 397 Computer Forensic Processing Techniques

    Lecture 398 Computer Forensic Processing Techniques

    Lecture 399 Computer Forensic Processing Techniques

    Lecture 400 Computer Forensic Processing Techniques

    Lecture 401 Computer Forensic Processing Techniques

    Lecture 402 Computer Forensic Processing Techniques

    Lecture 403 Computer Forensic Processing Techniques

    Lecture 404 Computer Forensic Processing Techniques

    Lecture 405 Computer Forensic Processing Techniques

    Lecture 406 Computer Forensic Processing Techniques

    Lecture 407 Computer Forensic Processing Techniques

    Lecture 408 Computer Forensic Processing Techniques

    Lecture 409 Computer Forensic Processing Techniques

    Lecture 410 Computer Forensic Processing Techniques

    Lecture 411 Computer Forensic Processing Techniques

    Lecture 412 Computer Forensic Processing Techniques

    Lecture 413 Computer Forensic Processing Techniques

    Lecture 414 Computer Forensic Processing Techniques

    Lecture 415 Computer Forensic Processing Techniques

    Lecture 416 Computer Forensic Processing Techniques

    Lecture 417 Computer Forensic Processing Techniques

    Lecture 418 National Software Reference Library (NSRL)

    Lecture 419 Computer Forensic Processing Techniques

    Lecture 420 Computer Forensic Processing Techniques

    Lecture 421 Computer Forensic Processing Techniques

    Lecture 422 Computer Forensic Processing Techniques

    Lecture 423 Computer Forensic Processing Techniques

    Lecture 424 Computer Forensic Processing Techniques

    Lecture 425 Computer Forensic Processing Techniques

    Lecture 426 Computer Forensic Processing Techniques

    Lecture 427 Computer Forensic Processing Techniques

    Lecture 428 Computer Forensic Processing Techniques

    Lecture 429 Computer Forensic Processing Techniques

    Lecture 430 Computer Forensic Processing Techniques

    Lecture 431 Computer Forensic Processing Techniques

    Lecture 432 Computer Forensic Processing Techniques

    Lecture 433 Review

    Section 12: Module 12 - Specialized Artifact Recovery

    Lecture 434 Specialized Artifact Recovery

    Lecture 435 Overview

    Lecture 436 Section 1: Forensics Workstation Prep

    Lecture 437 Forensics Workstation Prep

    Lecture 438 Forensics Workstation Prep

    Lecture 439 Forensics Workstation Prep

    Lecture 440 Forensics Workstation Prep

    Lecture 441 Forensics Workstation Prep

    Lecture 442 Settings For The Nodrivetypeautorun Registry Entry

    Lecture 443 Prep System Stage

    Lecture 444 Prep System Stage

    Lecture 445 Prep System Stage

    Lecture 446 Section 2: Windows Components with Investigative Interest

    Lecture 447 Windows Components with Investigative Interest

    Lecture 448 Types of Dates

    Lecture 449 File Signatures

    Lecture 450 File Signatures

    Lecture 451 File Signatures

    Lecture 452 File Signatures

    Lecture 453 Image File Databases

    Lecture 454 Image File Databases

    Lecture 455 The Windows OS

    Lecture 456 Windows Operating Environment

    Lecture 457 Windows Registry

    Lecture 458 Windows Registry

    Lecture 459 Windows Registry Hives

    Lecture 460 Windows Registry Hives

    Lecture 461 Windows Registry Hives

    Lecture 462 Windows Registry Hives

    Lecture 463 Windows Registry Hives

    Lecture 464 Windows NT/2000/XP Registry

    Lecture 465 Windows Vista/Win7, 8, 10 Registry

    Lecture 466 Windows Alternate Data Streams

    Lecture 467 Windows Alternate Data Streams

    Lecture 468 Windows Unique ID Numbers

    Lecture 469 Windows Unique ID Numbers

    Lecture 470 Other ID’s

    Lecture 471 Section 3: Files Containing Historical Information

    Lecture 472 Historical Files

    Lecture 473 Historical Files

    Lecture 474 Historical Files

    Lecture 475 Historical Files

    Lecture 476 Historical Files

    Lecture 477 Splunk

    Lecture 478 Historical Files

    Lecture 479 Historical Files

    Lecture 480 Event Viewer

    Lecture 481 Historical Files

    Lecture 482 Historical Files

    Lecture 483 Historical Files

    Lecture 484 Historical Files

    Lecture 485 Historical Files

    Lecture 486 Historical Files

    Lecture 487 Historical Files

    Lecture 488 Historical Files

    Lecture 489 Historical Files

    Lecture 490 Historical Files

    Lecture 491 Historical Files

    Lecture 492 Historical Files

    Lecture 493 Historical Files

    Lecture 494 Historical Files

    Lecture 495 Outlook E-Mail

    Lecture 496 Outlook E-Mail

    Lecture 497 Web E-Mail

    Lecture 498 Section 4: Web Forensics

    Lecture 499 Web Forensics

    Lecture 500 Historical Files

    Lecture 501 IE database location

    Lecture 502 Mozilla Firefox SQLite database

    Lecture 503 Google Chrome

    Lecture 504 Microsoft Edge

    Lecture 505 Understanding The Database Files

    Lecture 506 Understanding The Database Files

    Lecture 507 Investigating SQLite Files

    Lecture 508 Investigating SQLite Files

    Lecture 509 Investigating SQLite Files

    Lecture 510 Tables Relation

    Lecture 511 Tables Relation

    Lecture 512 Viewing Visited Websites

    Lecture 513 Review

    Section 13: Module 13 - Electronic Discovery and Electronically Stored Information

    Lecture 514 Electronic Discovery and Electronically Stored Information

    Lecture 515 Overview

    Lecture 516 eDiscovery

    Lecture 517 eDiscovery

    Lecture 518 Discoverable ESI Material

    Lecture 519 Discoverable ESI Material

    Lecture 520 eDiscovery Notification

    Lecture 521 Required Disclosure

    Lecture 522 eDiscovery Conference

    Lecture 523 Preserving Information

    Lecture 524 eDiscovery Liaison

    Lecture 525 eDiscovery Products

    Lecture 526 Metadata

    Lecture 527 What is Metadata?

    Lecture 528 Data Retention Architecture

    Lecture 529 “Safe Harbor” Rule 37(f)

    Lecture 530 eDiscovery Spoliation

    Lecture 531 Tools for eDiscovery

    Lecture 532 Review

    Section 14: Module 14 - Mobile Forensics

    Lecture 533 Mobile Forensics

    Lecture 534 Overview

    Lecture 535 Section 1: Cellular Network

    Lecture 536 Mobile Devices

    Lecture 537 Types of Cell Networks

    Lecture 538 What can a criminal do with Cell Phones?

    Lecture 539 Cell Phone Forensics

    Lecture 540 Forensics Information in Cell Phones

    Lecture 541 Subscriber Identity Module (SIM)

    Lecture 542 Integrated Circuit Card Identification (ICCID)

    Lecture 543 International Mobile Equipment Identifier (IMEI)

    Lecture 544 Electronic Seal Number (ESN)

    Lecture 545 Section 2: Forensic Process

    Lecture 546 Device Seizure

    Lecture 547 Device Seizure

    Lecture 548 Device Seizure

    Lecture 549 Acquisition

    Lecture 550 Data Acquisition

    Lecture 551 Acquire Data from SIM Cards

    Lecture 552 SIM Cards

    Lecture 553 Mobile Device Memory

    Lecture 554 Data Analysis

    Lecture 555 Reality

    Lecture 556 Analyze Information

    Lecture 557 Analyze

    Lecture 558 Non-Invasive Forensics

    Lecture 559 Non-Invasive Methods

    Lecture 560 Invasive Methods

    Lecture 561 Forensic Methods

    Lecture 562 Section 3: Tools

    Lecture 563 Cell Phone Forensic Tools

    Lecture 564 Device and SIM Card Seizure

    Lecture 565 Cell Phone Analyzer

    Lecture 566 Tools

    Lecture 567 Forensic Card Reader

    Lecture 568 ForensicSIM Tool

    Lecture 569 Forensic Challenges

    Lecture 570 Section 4: Paraben Forensics

    Lecture 571 Paraben Mobile Field Kit

    Lecture 572 Paraben Forensics Hardware

    Lecture 573 Paraben: Power Bank

    Lecture 574 Paraben: Mobile Field Kit

    Lecture 575 Paraben: Wireless Stronghold Tent

    Lecture 576 Paraben: Passport Stronghold Bag

    Lecture 577 Paraben: Project-a-phone

    Lecture 578 Paraben: Project-a-phone

    Lecture 579 Paraben: SIM Card Seizure

    Lecture 580 Paraben: Sticks

    Lecture 581 Paraben: P2C-P2 Commander

    Lecture 582 Review

    Section 15: Module 15 - Digital Forensics Reporting

    Lecture 583 Digital Forensics Reporting

    Lecture 584 Overview

    Lecture 585 Analysis Report

    Lecture 586 Definition

    Lecture 587 Computer Sciences

    Lecture 588 Ten Laws of Good Report Writing

    Lecture 589 Cover Page

    Lecture 590 Table of Contents

    Lecture 591 Examination Report

    Lecture 592 Background

    Lecture 593 Request

    Lecture 594 Summary of Findings

    Lecture 595 Forensic Examination

    Lecture 596 Tools

    Lecture 597 Evidence

    Lecture 598 Items of Evidence

    Lecture 599 Analysis

    Lecture 600 Findings

    Lecture 601 Conclusion

    Lecture 602 Exhibits

    Lecture 603 Signatures

    Lecture 604 Review

    Digital security experts working in law-enforcement agencies,IT security managers,Law enforcement agents or police officers,Digital forensic experts,Attorneys,Data owners