Computer and Hacking Forensics Notes



By: musa hassan | Related Lesson: | Modified: March 22, 2018

Modern Forensics

Evolution of Forensics 1822-1911: Fingerprints(Galton) 1887-1954: Blood grouping(Lattes) 1891-1955: Firearms(Goddard) 1858-1946: Documentation(Osborn) 1847-1915: Criminal Investigation(Gross) 1932: FBI 1984- Computer Analysis/Response team 1993-1st [view]

By: latyna96 | Related Lesson: | Modified: March 21, 2018

Hard Disks and File Systems

Types disk network DB others disk drives internal external ”compare info” speed xfr time capacity physical structure track density arial density logical structures FAT, FAT32 NTFS EXT2, EXT3… EFS, JFS, Reiser, etc cd [view]

By: enaves | Related Lesson: | Modified: March 21, 2018


bxqb [view]

By: soufianeneli | Related Lesson: | Modified: March 21, 2018


recover my file   [view]

By: misngs2018 | Related Lesson: | Modified: March 21, 2018

computer forensics lab

planning a lab budget items physical location  environmental conditions tempest/emsec fire codes restricting access licensing electrical requirements work area separation HR auditing hardware/hard drive considerations  mobile lab consideration [view]

By: enaves | Related Lesson: | Modified: March 21, 2018


Process : 1.Identification of Evidence 2.Preserve till it is useful 3. Extract and interpret the evidence 4. Document the evidence 5. Present   MD5/SHA : Comparison to overview the safety of the evidence.   Necessity of Evidence : Whole: Evidence m [view]

By: reflex440 | Related Lesson: | Modified: March 21, 2018

First Responder

Who is it? individual or team role what will each person do at the crime scene expertise w/ evidence toolkit commercial/open source procedures securing the crime scene conducting interviews checklists interviews documentation of the crim [view]

By: enaves | Related Lesson: | Modified: March 21, 2018

Data Acquisition

Acquisition= To acquire-Acquire evidence of some sort Tools used to acquire data:– Drive Spy– FTK Imager (Similar to nCase tool)– DD Command (Linux command to make copies of data/files) [view]

By: sarina3 | Related Lesson: | Modified: March 20, 2018

investigative process

we need  rules and laws preparation of workplace and build a team the process search warrant secure the scene collect evidence secure evidence acquire data analyze data document and report [view]

By: tsieh | Related Lesson: | Modified: March 20, 2018

« First ‹ Previous 1 5 13 14 15 16 17 25 115 401 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?