Certified Digital Forensics Examiner
Last updated 12/2020
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.90 GB | Duration: 6h 18m
Last updated 12/2020
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.90 GB | Duration: 6h 18m
Updated Aug 2020
What you'll learn
After successfully completing this course, the students shall be able to:
Establish industry acceptable digital forensics standards
Learn the tools of trade
Comprehensively investigate the incident for digital evidence
Discover electronic evidence
Understand cellphone, computer and other digital forensics
Pass the CDFE certification exam
Requirements
The course requires the prospective candidates to have a minimum of one year of experience in the field related to digital forensics.
A good understanding and hands-on working knowledge of digital devices such as smartphones, tablets, personal computers and laptops is also required to completely understand the contents of this course.
Description
This is the updated version of the course (Updated Aug 2020)The Certified Digital Forensics Examiner (CDFE) is a vendor neutral certification offered by Mile2 for the aspiring cyber-crime fraud investigators. The course is based on the recommended curriculum for the same certification. The course enables the students to investigate, pursue litigation, provide proof of guilt, or take corrective measures based on the evidence collected through digital media. The Certified Digital Forensic Examiner (CDFE) course is a comprehensive training course based on the official Mile2 certification exam curriculum. The course teaches the advanced concepts such as investigation of digital forensic incidents, usual ways to identify and discover anomalies in the stored data, data acquisition, forensic examination methods and smart devices investigation techniques. The course is ideal for the candidates willing to appear for the CDFE certification exam. Exam Information Upon completion, Certified Digital Forensics Examiner students will be able to establish industry acceptable digital forensics standards with current best practices and policies. Students will also be prepared to competently take the C)DFE exam.
Overview
Section 1: Module 1 - Computer Forensics Incidents
Lecture 1 Computer Forensics Incidents
Lecture 2 Where are We?
Lecture 3 Overview
Lecture 4 Section 1: Origins of digital forensic science
Lecture 5 The Legal System
Lecture 6 The Legal System
Lecture 7 The Legal System
Lecture 8 The Legal System
Lecture 9 Section 2: Differences between criminal and civil incidents
Lecture 10 Criminal Incidents
Lecture 11 Criminal Incidents
Lecture 12 Criminal Incidents
Lecture 13 Criminal Incidents
Lecture 14 Criminal Incidents
Lecture 15 Criminal Incidents
Lecture 16 Criminal Incidents
Lecture 17 Civil Incidents
Lecture 18 Civil Incidents
Lecture 19 Civil Incidents
Lecture 20 Section 3: Types of computer fraud incidents
Lecture 21 Computer Fraud
Lecture 22 Computer Fraud
Lecture 23 Computer Fraud
Lecture 24 Computer Fraud
Lecture 25 Section 4: Internal and external threats
Lecture 26 Internal Threats
Lecture 27 Internal Threats
Lecture 28 External Threats
Lecture 29 External Threats
Lecture 30 External Threats
Lecture 31 External Threats
Lecture 32 Section 5: Investigative challenges
Lecture 33 Investigative Challenges
Lecture 34 Investigative Challenges
Lecture 35 Investigative Challenges
Lecture 36 Common Frame of Reference
Lecture 37 Media Volume
Lecture 38 Review
Section 2: Module 2 - Incident Handling
Lecture 39 Incident Handling
Lecture 40 Overview
Lecture 41 Section 1: What is an Incident?
Lecture 42 Incident Handling Defined
Lecture 43 What is a Security Event?
Lecture 44 Common Security Events of Interest
Lecture 45 What is a Security Incident?
Lecture 46 What is an Incident Response Plan?
Lecture 47 When does the Plan get Initiated?
Lecture 48 Common Goals of Incident Response Management
Lecture 49 Section 2: Incident Handling Steps
Lecture 50 Incident Handling Steps
Lecture 51 Phase 1: Preparation
Lecture 52 Goal
Lecture 53 Be Prepared
Lecture 54 The Incident Response Plan
Lecture 55 Incident Handling
Lecture 56 Incident Response Plan
Lecture 57 Incident Response Plan
Lecture 58 Incident Response Plan
Lecture 59 Roles of the Incident Response Team
Lecture 60 Incident Response Team Makeup
Lecture 61 Challenges of building an IRT
Lecture 62 Incident Response Training and Awareness
Lecture 63 Jump Kit
Lecture 64 Jump Kit
Lecture 65 Prepare Your Sites and Systems
Lecture 66 Prepare Your Sites and Systems
Lecture 67 Prepare Your Sites and Systems
Lecture 68 Prepare Your Sites and Systems
Lecture 69 Prepare Your Sites and Systems
Lecture 70 Prepare Your Sites and Systems
Lecture 71 Phase 2: Identification and Initial Response
Lecture 72 Goal
Lecture 73 Identification of an Incident
Lecture 74 Basic Incident Response Steps
Lecture 75 Proper Evidence Handling
Lecture 76 Phase 3: Containment
Lecture 77 Goal
Lecture 78 Containment
Lecture 79 Onsite Response
Lecture 80 Secure the Area
Lecture 81 Conduct Research
Lecture 82 Make Recommendations
Lecture 83 Establish Intervals
Lecture 84 Capture Digital Evidence
Lecture 85 Change Passwords
Lecture 86 Phase 4: Eradication
Lecture 87 Goal
Lecture 88 Determine Cause
Lecture 89 Defend Against Follow-on Attacks
Lecture 90 More Defenses
Lecture 91 Analyze Threat and Vulnerability
Lecture 92 Restore System(s) to Operation
Lecture 93 Phase 5: Recovery
Lecture 94 Goal
Lecture 95 Report Findings
Lecture 96 Restore System
Lecture 97 Verify
Lecture 98 Decide
Lecture 99 Monitor Systems
Lecture 100 Phase 6: Follow-up
Lecture 101 Goal
Lecture 102 Follow-up Report
Lecture 103 Follow-up Report
Lecture 104 Review
Section 3: Module 3 - Computer Forensic Investigative Theory
Lecture 105 Computer Forensic Investigative Theory
Lecture 106 Overview
Lecture 107 Section 1: Investigation Theory
Lecture 108 Computer Forensic Investigative Theory
Lecture 109 Computer Forensic Investigative Theory
Lecture 110 Computer Forensic Investigative Theory
Lecture 111 Computer Forensic Investigative Theory
Lecture 112 Computer Forensic Investigative Theory
Lecture 113 Computer Forensic Investigative Theory
Lecture 114 Section 2: Investigative Concepts
Lecture 115 Computer Forensic Investigative Theory
Lecture 116 Computer Forensic Investigative Theory
Lecture 117 Computer Forensic Investigative Theory
Lecture 118 Computer Forensic Investigative Theory
Lecture 119 Computer Forensic Investigative Theory
Lecture 120 Computer Forensic Investigative Theory
Lecture 121 Computer Forensic Investigative Theory
Lecture 122 Computer Forensic Investigative Theory
Lecture 123 Section 3: BEA & EFA
Lecture 124 Computer Forensic Investigative Theory
Lecture 125 Computer Forensic Investigative Theory
Lecture 126 Computer Forensic Investigative Theory
Lecture 127 Computer Forensic Investigative Theory
Lecture 128 Computer Forensic Investigative Theory
Lecture 129 Computer Forensic Investigative Theory
Lecture 130 Computer Forensic Investigative Theory
Lecture 131 Computer Forensic Investigative Theory
Lecture 132 Computer Forensic Investigative Theory
Lecture 133 Computer Forensic Investigative Theory
Lecture 134 Computer Forensic Investigative Theory
Lecture 135 Computer Forensic Investigative Theory
Lecture 136 McAfee Geotagging
Lecture 137 Review
Section 4: Module 4 - Investigative Process
Lecture 138 Investigative Process
Lecture 139 Overview
Lecture 140 Section 1: Investigation Prerequisites
Lecture 141 Prior to the Investigation
Lecture 142 Forensics Workstation
Lecture 143 Building Your Team of Investigators
Lecture 144 Who is involved in Computer Forensics?
Lecture 145 Who is involved in Computer Forensics?
Lecture 146 Approval Authority and Authorization
Lecture 147 Risk Assessment
Lecture 148 Forensic Investigation Toolkit
Lecture 149 Section 2: Investigation Process
Lecture 150 Investigating Computer Crimes
Lecture 151 Investigation Methodology
Lecture 152 Preparing for an Investigation
Lecture 153 Preparing for an Investigation (cont.)
Lecture 154 Preparing for an Investigation (cont.)
Lecture 155 Search Warrant
Lecture 156 Forensic Photography
Lecture 157 Preliminary Information
Lecture 158 First Responder
Lecture 159 Collecting Physical Evidence
Lecture 160 Collecting Electronic Evidence
Lecture 161 Collecting Electronic Evidence
Lecture 162 Collecting Electronic Evidence (cont.)
Lecture 163 Guideline for Acquiring Electronic Evidence
Lecture 164 Securing the Evidence
Lecture 165 Managing the Evidence
Lecture 166 Chain of Custody
Lecture 167 Duplicate the Data
Lecture 168 Verify the Integrity of the Image
Lecture 169 Recover Last Data
Lecture 170 Data Analysis
Lecture 171 Data Analysis Tools
Lecture 172 Assessing the Evidence
Lecture 173 Assessing the Case
Lecture 174 Assessing the Case (cont.)
Lecture 175 Location Assessment
Lecture 176 Best Practices
Lecture 177 Documentation
Lecture 178 Gathering and Organizing Information
Lecture 179 Writing the Report
Lecture 180 Writing the Report (cont.)
Lecture 181 Expert Witness
Lecture 182 Closing the Case
Lecture 183 Review
Section 5: Module 5 - Digital Acquisition & Analysis Tools
Lecture 184 Digital Acquisition & Analysis Tools
Lecture 185 Overview
Lecture 186 Section 1: Acquisition Procedures
Lecture 187 Digital Acquisition
Lecture 188 Digital Acquisition
Lecture 189 Digital Acquisition
Lecture 190 Digital Acquisition
Lecture 191 Digital Acquisition Procedures
Lecture 192 Digital Acquisition Procedures
Lecture 193 Digital Acquisition Procedures
Lecture 194 Digital Acquisition Procedures
Lecture 195 Digital Acquisition Procedures
Lecture 196 Digital Acquisition Procedures
Lecture 197 Digital Acquisition Procedures
Lecture 198 Digital Acquisition Procedures
Lecture 199 Digital Acquisition Procedures
Lecture 200 Digital Acquisition Procedures
Lecture 201 Digital Acquisition Procedures
Lecture 202 Digital Acquisition Procedures
Lecture 203 Digital Acquisition Procedures
Lecture 204 Section 2: Evidence Authentication
Lecture 205 Digital Acquisition Procedures
Lecture 206 Digital Acquisition
Lecture 207 Digital Acquisition Procedures
Lecture 208 Digital Acquisition Procedures
Lecture 209 Digital Acquisition Procedures
Lecture 210 Digital Acquisition Procedures
Lecture 211 Section 3: Tools
Lecture 212 Digital Acquisition Procedures
Lecture 213 Digital Forensic Analysis Tools
Lecture 214 Digital Forensic Analysis Tools
Lecture 215 Digital Forensic Analysis Tools
Lecture 216 Digital Forensic Analysis Tools
Lecture 217 Review
Section 6: Module 6 - Disks and Storages
Lecture 218 Disks and Storages
Lecture 219 Overview
Lecture 220 Section 1: Disk OS and FileSystems
Lecture 221 Disk Based Operating Systems
Lecture 222 Disk Based Operating Systems
Lecture 223 Disk Based Operating Systems
Lecture 224 Disk Based Operating Systems
Lecture 225 Disk Based Operating Systems
Lecture 226 OS / File Storage Concepts
Lecture 227 OS / File Storage Concepts
Lecture 228 OS / File Storage Concepts
Lecture 229 OS / File Storage Concepts
Lecture 230 OS / File Storage Concepts
Lecture 231 OS / File Storage Concepts
Lecture 232 Section 2: Spinning Disks Forensics
Lecture 233 Disk Storage Concepts
Lecture 234 Disk Storage Concepts
Lecture 235 Disk Storage Concepts
Lecture 236 Disk Storage Concepts
Lecture 237 Disk Storage Concepts
Lecture 238 Disk Storage Concepts
Lecture 239 Disk Storage Concepts
Lecture 240 Disk Storage Concepts
Lecture 241 Disk Storage Concepts
Lecture 242 File Carving
Lecture 243 Fragmentary Analysis
Lecture 244 Section 3: SSD Forensics
Lecture 245 Inside SSD
Lecture 246 Inside SSD
Lecture 247 TRIM
Lecture 248 Implications on Forensics
Lecture 249 Implications on Forensics
Lecture 250 Forensics vs Encryption
Lecture 251 Section 4: Files Management
Lecture 252 Disk Storage Concepts
Lecture 253 Disk Storage Concepts
Lecture 254 Disk Storage Concepts
Lecture 255 Disk Storage Concepts
Lecture 256 Disk Storage Concepts
Lecture 257 Disk Storage Concepts
Lecture 258 Disk Storage Concepts
Lecture 259 Quick View Plus
Lecture 260 Review
Section 7: Module 7 - Forensic Examination Protocols
Lecture 261 Forensic Examination Protocols
Lecture 262 Overview
Lecture 263 Section 1: Science Applied to Forensics
Lecture 264 Forensic Examination Protocols
Lecture 265 Forensic Examination Protocols
Lecture 266 Forensic Examination Protocols
Lecture 267 Forensic Examination Protocols
Lecture 268 Forensic Examination Protocols
Lecture 269 Section 2: Cardinal Rules & Alpha 5
Lecture 270 Forensic Examination
Lecture 271 Forensic Examination
Lecture 272 Forensic Examination
Lecture 273 Forensic Examination
Lecture 274 Forensic Examination
Lecture 275 Forensic Examination
Lecture 276 Forensic Examination
Lecture 277 Forensic Examination
Lecture 278 Forensic Examination
Lecture 279 Section 3: The 20 Basic Steps of Forensics
Lecture 280 Forensic Examination
Lecture 281 Forensic Examination
Lecture 282 Forensic Examination
Lecture 283 Forensic Examination
Lecture 284 Forensic Examination
Lecture 285 Forensic Examination
Lecture 286 Forensic Examination
Lecture 287 Forensic Examination
Lecture 288 Forensic Examination
Lecture 289 Forensic Examination
Lecture 290 Forensic Examination
Lecture 291 Forensic Examination
Lecture 292 Forensic Examination
Lecture 293 Review
Section 8: Module 8 - Digital Evidence Protocols
Lecture 294 Digital Evidence Protocols
Lecture 295 Overview
Lecture 296 Section 1: Digital Evidence Categories
Lecture 297 Digital Evidence Concepts
Lecture 298 Digital Evidence Concepts
Lecture 299 Digital Evidence Concepts
Lecture 300 Digital Evidence Categories
Lecture 301 Digital Evidence Categories
Lecture 302 Digital Evidence Categories
Lecture 303 Digital Evidence Categories
Lecture 304 Digital Evidence Categories
Lecture 305 Digital Evidence Categories
Lecture 306 Digital Evidence Categories
Lecture 307 Digital Evidence Categories
Lecture 308 Digital Evidence Categories
Lecture 309 Digital Evidence Categories
Lecture 310 Digital Evidence Categories
Lecture 311 Digital Evidence Categories
Lecture 312 Digital Evidence Categories
Lecture 313 Digital Evidence Categories
Lecture 314 Digital Evidence Categories
Lecture 315 Digital Evidence Categories
Lecture 316 Digital Evidence Categories
Lecture 317 Digital Evidence Categories
Lecture 318 Digital Evidence Categories
Lecture 319 Section 2: Evidence Admissibility
Lecture 320 Digital Evidence: Admissibility
Lecture 321 Digital Evidence: Admissibility
Lecture 322 Digital Evidence: Admissibility
Lecture 323 Review
Section 9: Module 9 - Digital Evidence Presentation
Lecture 324 Digital Evidence Presentation
Lecture 325 Overview
Lecture 326 Section 1: The Best Evidence Rule
Lecture 327 Digital Evidence Presentation
Lecture 328 Digital Evidence Presentation
Lecture 329 Digital Evidence Presentation
Lecture 330 Digital Evidence Presentation
Lecture 331 Digital Evidence Presentation
Lecture 332 Digital Evidence Presentation
Lecture 333 Digital Evidence Presentation
Lecture 334 Digital Evidence
Lecture 335 Digital Evidence
Lecture 336 Digital Evidence
Lecture 337 Digital Evidence
Lecture 338 Digital Evidence
Lecture 339 Section 2: Hearsay
Lecture 340 Digital Evidence: Hearsay
Lecture 341 Digital Evidence: Hearsay
Lecture 342 Digital Evidence: Hearsay
Lecture 343 Digital Evidence: Hearsay
Lecture 344 Section 3: Authenticity and Alteration
Lecture 345 Digital Evidence
Lecture 346 Digital Evidence
Lecture 347 Digital Evidence
Lecture 348 Digital Evidence
Lecture 349 Digital Evidence
Lecture 350 Digital Evidence
Lecture 351 Review
Section 10: Module 10 - Computer Forensic Laboratory Protocols
Lecture 352 Computer Forensic Laboratory Protocols
Lecture 353 Overview
Lecture 354 Overview
Lecture 355 Overview
Lecture 356 Quality Assurance
Lecture 357 Quality Assurance
Lecture 358 Standard Operating Procedures
Lecture 359 Reports
Lecture 360 Peer Review
Lecture 361 Who Should Review?
Lecture 362 Peer Review
Lecture 363 Consistency
Lecture 364 Accuracy
Lecture 365 Research
Lecture 366 Validation
Lecture 367 Relevance
Lecture 368 Peer Review
Lecture 369 Peer Review
Lecture 370 Annual Review
Lecture 371 Deviation
Lecture 372 Deviation
Lecture 373 Deviation
Lecture 374 Deviation
Lecture 375 Lab Intake
Lecture 376 Lab Intake
Lecture 377 Lab Intake
Lecture 378 Tracking
Lecture 379 Tracking
Lecture 380 Storage
Lecture 381 Storage
Lecture 382 Discovery
Lecture 383 Discovery
Lecture 384 Discovery
Lecture 385 Discovery
Lecture 386 Discovery
Lecture 387 Review
Section 11: Module 11 - Computer Forensic Processing Techniques
Lecture 388 Computer Forensic Processing Techniques
Lecture 389 Overview
Lecture 390 Computer Forensic Processing Techniques
Lecture 391 Computer Forensic Processing Techniques
Lecture 392 Computer Forensic Processing Techniques
Lecture 393 Computer Forensic Processing Techniques
Lecture 394 Computer Forensic Processing Techniques
Lecture 395 Computer Forensic Processing Techniques
Lecture 396 Computer Forensic Processing Techniques
Lecture 397 Computer Forensic Processing Techniques
Lecture 398 Computer Forensic Processing Techniques
Lecture 399 Computer Forensic Processing Techniques
Lecture 400 Computer Forensic Processing Techniques
Lecture 401 Computer Forensic Processing Techniques
Lecture 402 Computer Forensic Processing Techniques
Lecture 403 Computer Forensic Processing Techniques
Lecture 404 Computer Forensic Processing Techniques
Lecture 405 Computer Forensic Processing Techniques
Lecture 406 Computer Forensic Processing Techniques
Lecture 407 Computer Forensic Processing Techniques
Lecture 408 Computer Forensic Processing Techniques
Lecture 409 Computer Forensic Processing Techniques
Lecture 410 Computer Forensic Processing Techniques
Lecture 411 Computer Forensic Processing Techniques
Lecture 412 Computer Forensic Processing Techniques
Lecture 413 Computer Forensic Processing Techniques
Lecture 414 Computer Forensic Processing Techniques
Lecture 415 Computer Forensic Processing Techniques
Lecture 416 Computer Forensic Processing Techniques
Lecture 417 Computer Forensic Processing Techniques
Lecture 418 National Software Reference Library (NSRL)
Lecture 419 Computer Forensic Processing Techniques
Lecture 420 Computer Forensic Processing Techniques
Lecture 421 Computer Forensic Processing Techniques
Lecture 422 Computer Forensic Processing Techniques
Lecture 423 Computer Forensic Processing Techniques
Lecture 424 Computer Forensic Processing Techniques
Lecture 425 Computer Forensic Processing Techniques
Lecture 426 Computer Forensic Processing Techniques
Lecture 427 Computer Forensic Processing Techniques
Lecture 428 Computer Forensic Processing Techniques
Lecture 429 Computer Forensic Processing Techniques
Lecture 430 Computer Forensic Processing Techniques
Lecture 431 Computer Forensic Processing Techniques
Lecture 432 Computer Forensic Processing Techniques
Lecture 433 Review
Section 12: Module 12 - Specialized Artifact Recovery
Lecture 434 Specialized Artifact Recovery
Lecture 435 Overview
Lecture 436 Section 1: Forensics Workstation Prep
Lecture 437 Forensics Workstation Prep
Lecture 438 Forensics Workstation Prep
Lecture 439 Forensics Workstation Prep
Lecture 440 Forensics Workstation Prep
Lecture 441 Forensics Workstation Prep
Lecture 442 Settings For The Nodrivetypeautorun Registry Entry
Lecture 443 Prep System Stage
Lecture 444 Prep System Stage
Lecture 445 Prep System Stage
Lecture 446 Section 2: Windows Components with Investigative Interest
Lecture 447 Windows Components with Investigative Interest
Lecture 448 Types of Dates
Lecture 449 File Signatures
Lecture 450 File Signatures
Lecture 451 File Signatures
Lecture 452 File Signatures
Lecture 453 Image File Databases
Lecture 454 Image File Databases
Lecture 455 The Windows OS
Lecture 456 Windows Operating Environment
Lecture 457 Windows Registry
Lecture 458 Windows Registry
Lecture 459 Windows Registry Hives
Lecture 460 Windows Registry Hives
Lecture 461 Windows Registry Hives
Lecture 462 Windows Registry Hives
Lecture 463 Windows Registry Hives
Lecture 464 Windows NT/2000/XP Registry
Lecture 465 Windows Vista/Win7, 8, 10 Registry
Lecture 466 Windows Alternate Data Streams
Lecture 467 Windows Alternate Data Streams
Lecture 468 Windows Unique ID Numbers
Lecture 469 Windows Unique ID Numbers
Lecture 470 Other ID’s
Lecture 471 Section 3: Files Containing Historical Information
Lecture 472 Historical Files
Lecture 473 Historical Files
Lecture 474 Historical Files
Lecture 475 Historical Files
Lecture 476 Historical Files
Lecture 477 Splunk
Lecture 478 Historical Files
Lecture 479 Historical Files
Lecture 480 Event Viewer
Lecture 481 Historical Files
Lecture 482 Historical Files
Lecture 483 Historical Files
Lecture 484 Historical Files
Lecture 485 Historical Files
Lecture 486 Historical Files
Lecture 487 Historical Files
Lecture 488 Historical Files
Lecture 489 Historical Files
Lecture 490 Historical Files
Lecture 491 Historical Files
Lecture 492 Historical Files
Lecture 493 Historical Files
Lecture 494 Historical Files
Lecture 495 Outlook E-Mail
Lecture 496 Outlook E-Mail
Lecture 497 Web E-Mail
Lecture 498 Section 4: Web Forensics
Lecture 499 Web Forensics
Lecture 500 Historical Files
Lecture 501 IE database location
Lecture 502 Mozilla Firefox SQLite database
Lecture 503 Google Chrome
Lecture 504 Microsoft Edge
Lecture 505 Understanding The Database Files
Lecture 506 Understanding The Database Files
Lecture 507 Investigating SQLite Files
Lecture 508 Investigating SQLite Files
Lecture 509 Investigating SQLite Files
Lecture 510 Tables Relation
Lecture 511 Tables Relation
Lecture 512 Viewing Visited Websites
Lecture 513 Review
Section 13: Module 13 - Electronic Discovery and Electronically Stored Information
Lecture 514 Electronic Discovery and Electronically Stored Information
Lecture 515 Overview
Lecture 516 eDiscovery
Lecture 517 eDiscovery
Lecture 518 Discoverable ESI Material
Lecture 519 Discoverable ESI Material
Lecture 520 eDiscovery Notification
Lecture 521 Required Disclosure
Lecture 522 eDiscovery Conference
Lecture 523 Preserving Information
Lecture 524 eDiscovery Liaison
Lecture 525 eDiscovery Products
Lecture 526 Metadata
Lecture 527 What is Metadata?
Lecture 528 Data Retention Architecture
Lecture 529 “Safe Harbor” Rule 37(f)
Lecture 530 eDiscovery Spoliation
Lecture 531 Tools for eDiscovery
Lecture 532 Review
Section 14: Module 14 - Mobile Forensics
Lecture 533 Mobile Forensics
Lecture 534 Overview
Lecture 535 Section 1: Cellular Network
Lecture 536 Mobile Devices
Lecture 537 Types of Cell Networks
Lecture 538 What can a criminal do with Cell Phones?
Lecture 539 Cell Phone Forensics
Lecture 540 Forensics Information in Cell Phones
Lecture 541 Subscriber Identity Module (SIM)
Lecture 542 Integrated Circuit Card Identification (ICCID)
Lecture 543 International Mobile Equipment Identifier (IMEI)
Lecture 544 Electronic Seal Number (ESN)
Lecture 545 Section 2: Forensic Process
Lecture 546 Device Seizure
Lecture 547 Device Seizure
Lecture 548 Device Seizure
Lecture 549 Acquisition
Lecture 550 Data Acquisition
Lecture 551 Acquire Data from SIM Cards
Lecture 552 SIM Cards
Lecture 553 Mobile Device Memory
Lecture 554 Data Analysis
Lecture 555 Reality
Lecture 556 Analyze Information
Lecture 557 Analyze
Lecture 558 Non-Invasive Forensics
Lecture 559 Non-Invasive Methods
Lecture 560 Invasive Methods
Lecture 561 Forensic Methods
Lecture 562 Section 3: Tools
Lecture 563 Cell Phone Forensic Tools
Lecture 564 Device and SIM Card Seizure
Lecture 565 Cell Phone Analyzer
Lecture 566 Tools
Lecture 567 Forensic Card Reader
Lecture 568 ForensicSIM Tool
Lecture 569 Forensic Challenges
Lecture 570 Section 4: Paraben Forensics
Lecture 571 Paraben Mobile Field Kit
Lecture 572 Paraben Forensics Hardware
Lecture 573 Paraben: Power Bank
Lecture 574 Paraben: Mobile Field Kit
Lecture 575 Paraben: Wireless Stronghold Tent
Lecture 576 Paraben: Passport Stronghold Bag
Lecture 577 Paraben: Project-a-phone
Lecture 578 Paraben: Project-a-phone
Lecture 579 Paraben: SIM Card Seizure
Lecture 580 Paraben: Sticks
Lecture 581 Paraben: P2C-P2 Commander
Lecture 582 Review
Section 15: Module 15 - Digital Forensics Reporting
Lecture 583 Digital Forensics Reporting
Lecture 584 Overview
Lecture 585 Analysis Report
Lecture 586 Definition
Lecture 587 Computer Sciences
Lecture 588 Ten Laws of Good Report Writing
Lecture 589 Cover Page
Lecture 590 Table of Contents
Lecture 591 Examination Report
Lecture 592 Background
Lecture 593 Request
Lecture 594 Summary of Findings
Lecture 595 Forensic Examination
Lecture 596 Tools
Lecture 597 Evidence
Lecture 598 Items of Evidence
Lecture 599 Analysis
Lecture 600 Findings
Lecture 601 Conclusion
Lecture 602 Exhibits
Lecture 603 Signatures
Lecture 604 Review
Digital security experts working in law-enforcement agencies,IT security managers,Law enforcement agents or police officers,Digital forensic experts,Attorneys,Data owners