Computer and Hacking Forensics Notes

First class

Forensics have evolved over time.  From fingerprints,blood grouping(just the group type, not dna sequencing) , firearms, documentation, criminal investigation, FBI, Computer analysis, 1st international conference on cyber crime in 1993, widespread u [view]

By: priyankak20 | Related Lesson: | Modified: September 29, 2017

Forensic Program

PC Inspector File Recovery 4.0 FILE RECOVERY Recover Deleted File      Select logical drive      Select your files in folder deleted      Save your files Find Lost Data      (If data is lost due to quick-formatting-system crash, etc.) [view]

By: SparrowHawk | Related Lesson: | Modified: September 29, 2017

types of attacks

internal . external. [view]

By: daniel01 | Related Lesson: | Modified: September 28, 2017

Investigative Process md5sum Lab

Investigative Process md5sum Lab [view]

By: bolakamal | Related Lesson: | Modified: September 28, 2017

Investigative Process Total Recall

Investigative Process Total Recall  [view]

By: bolakamal | Related Lesson: | Modified: September 28, 2017

Investigative Process RecoverMyFiles

Investigative Process RecoverMyFiles [view]

By: bolakamal | Related Lesson: | Modified: September 28, 2017

Tools

PC inspector file recovery  [view]

By: bolakamal | Related Lesson: | Modified: September 28, 2017

investigation process

investigation process  1- search warrant  2- secure the scene  3- collect evidence 4- secure evidence  5- acquire data 6- analyze  7- documentation & report  [view]

By: bolakamal | Related Lesson: | Modified: September 28, 2017

Basic steps

Identification process 1- crime happens 2- ID a crime scene 3- warrant  4- first responder  5- seize evidence  6- transport 7- 2 bit-by-bit copies 8- md5/sha 9- chain of custody  10- storage 11- analysis 12- report 13- court   Evidence  Whole [view]

By: bolakamal | Related Lesson: | Modified: September 28, 2017

Process

Process: 1. Identification 2. Preservation 3. Extraction 4. Interpretation 5. Documentation 6. Presentation [view]

By: ATenai | Related Lesson: | Modified: September 28, 2017

« First ‹ Previous 1 23 113 121 122 123 124 125 133 223 401 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel