Computer and Hacking Forensics Notes

First Responder Hex Workshop Overview Lab

program to see pinary ِASCI code for all type files [view]

By: maheralahmad | Related Lesson: | Modified: February 25, 2018

Data Acquisition

  TYPES SERIAL -R5232 -R5485   ACQUISITION TOOLS DRIVE SPY FTK IMAGER DD COMMAND   OTHERS Netcat ……MASSTER GPStamp WritePROtect Logic Cube Adapter [view]

By: | Related Lesson: | Modified: February 25, 2018

invest. process

assess acquire analyze management report court   prep: build workstation -hardware -integrity -date/time -deleted files -removable media -analyze hard drives   build a team: attorney incident responders documenter expert witness analyzer photograph [view]

By: juanguad94 | Related Lesson: | Modified: February 24, 2018

modern forensics

types of attacks: internal and external  physical sciences ”to find truth” preserve evidence  from contamination   process: 1. identify the evidence 2. preservation: chain of custody 3. extraction: from crime scene to lab to court  4. [view]

By: juanguad94 | Related Lesson: | Modified: February 24, 2018

Investigative Process: RecoverMyFiles

find deleted, lost, orphaned files you can recover files or a whole drive [view]

By: enaves | Related Lesson: | Modified: February 24, 2018

Investigative Process PC Inspector File

PCI file recovery – tool helps recover deleted files, lost data, lost drive you have logical and physical drive options you can right click, save, look at properties, hexadecimal location [view]

By: enaves | Related Lesson: | Modified: February 24, 2018

Investigative Process md5calc lab

md5calc search google bullzip.com will enable you to right click and file and select ”MD5Calculator” from the menu. This will calculate the MD5 value from the selected file. compares it to the MD5 digest and original file [view]

By: enaves | Related Lesson: | Modified: February 24, 2018

Investigative Process

Laws 18 usc 1361 malicious mischief 18 usc 1029 fraud access devices 18 usc 1030 fraud computers Rule  Rule 402 Admissable Evidence  Rule 901 ID and Authentication Rule 608 conduct of witness rule 609 impeachment of evidence rule 502 attorne [view]

By: enaves | Related Lesson: | Modified: February 23, 2018

Investigative Process

LAWS 18USCode1361-Malicious Mischief 18USC1029-Fraud Access Device 18USC1030-Fraud Computer Systems Rule 402-Admissible Evidence Rule 901-ID & Authenticaion Rule 608- Conduct of Witness Rule 609- Impeachment of Evidence Rule 502- Attorney Client [view]

By: eugen072 | Related Lesson: | Modified: February 23, 2018

Investigative Process

Process Assess evidence Acquire -have it Analysis Management Report court Reparation:   Build workstation:    hardware Integrity DAte and time Deleted files REmovable media Analyze drive Build a team: Role and responsibilities Attorny Photogr [view]

By: adamsnjuguna | Related Lesson: | Modified: February 23, 2018

« First ‹ Previous 1 15 23 24 25 26 27 35 125 401 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel