Computer and Hacking Forensics Notes

Investigative Process

INTEGRITY- Snapshot of evidence. MB5 and SHA Peripheral: computer peripherals are the added components—printers, webcams, microphones, etc.—that increase a computer’s capacities. Bundle with Incident Reposone (IR) or Incident Handling Team, [view]

By: forensiclover | Related Lesson: | Modified: October 15, 2017

Laws to Know

Know these: 18 USC 1361 Malicious Mischief18 USC 1029 Fraud Access Dev.18 USC 1030 Fraud ComputersRule 402 Admissible EvidenceRule 901 ID & AuthenticationRule 608 Conduct of witnessRule 609 Impeachment of EvidenceRule 502 Attourney client privile [view]

By: jostroot | Related Lesson: | Modified: October 15, 2017

INVESTIGATIVE PROCESS

LAWS: 18 USC 1361-MALICIOUS MISCHIEF 18 USC 1029-FRAUD ACCESS DEV 18 USC 1030-FRAUD COMPUTERS 402-ADMISSABLE EVIDENCE 901 ID &AUTHENTICATON 608-CONDUCT OF WITNESS 609-IMPEACHMENT OF EVIDENCE 502-ATTORNEY CLIENT PRIVELEGES 614-INTERRROGATION OF WI [view]

By: LAKSHMI RAJAN | Related Lesson: | Modified: October 15, 2017

Hard Disk & File Systems

Very impressive. 1. Disk Drive 2. Types  3. Comparable Information 4. Physical Structure 5. Logical Structure 6. Partitions 7. File Systems 8. Interfaces 9. Windows Boot Process. Thank you. [view]

By: alainroch1er | Related Lesson: | Modified: October 14, 2017

Paraben's P2 Explorer

I recall that the Paraben’s P2 Explorer is the key to detect illicit files from cellphones, hard drives of computers and various other supports.  [view]

By: alainroch1er | Related Lesson: | Modified: October 14, 2017

Computer Forensics Labs

1. How to plan a computer forensics lab, 2. Budget Items – Physical Location – Environmental Conditions – TEMPEST / EMSEC – FIRE Codes  – Restricting Access – Licensing  -Electrical Requirements 3. Work Area Sepa [view]

By: alainroch1er | Related Lesson: | Modified: October 14, 2017

floppies?!

floppies?! [view]

By: cyberhobo | Related Lesson: | Modified: October 14, 2017

My remarks

Hi, I believe courses like this have to have transcript for learners with no background in IT. Regards, [view]

By: alainroch1er | Related Lesson: | Modified: October 14, 2017

notes-oct2k17

K4DirStat [view]

By: Dexter | Related Lesson: | Modified: October 14, 2017

PC inspector

recovers deleted files   PC inspector File Recovery [view]

By: fedwards17 | Related Lesson: | Modified: October 19, 2017

« First ‹ Previous 1 15 105 113 114 115 116 117 125 215 401 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel