Computer and Hacking Forensics Notes

Data acquisition

Open source Tools to acquire data 1- Drive Spy 2- FTK Imager 3- DD command [view]

By: ALI | Related Lesson: | Modified: November 6, 2017

Testdisk is also a Linux utility

Testdisk is also a Linux utility.  This lab demonstrates installation to confirm the most current version and they it demonstrates how the utility functions. Testdisk is a command line utility that provides a number of partition and file recovery fu [view]

By: jgalarza2 | Related Lesson: | Modified: November 6, 2017

Necleus Kernal tool

This lab in the Deleting and Recovering Deleted Files series demonstrates the Necleus Kernal tool.  The Necleus Kernal is a Windows utility used for file recovery services on Linux partitions from with a Windows environment, so on launch, you’ll o [view]

By: jgalarza2 | Related Lesson: | Modified: November 6, 2017

Handy Recovery

The Handy Recovery tool is a very quick, very efficient file recovery tool.   You’ll observe how it works and learn why it’s the ideal “go-to” tool to determine whether or not a hard drive has been sanitized. [view]

By: jgalarza2 | Related Lesson: | Modified: November 6, 2017

Deleting and Recovering Deleted Files

This is the second lab in the Deleting and Recovering Deleted Files series which demonstrates the tool, File Scavenger for file recovery.   You’ll learn how to configure it to determine your search criteria and observe the outcome/output of that r [view]

By: jgalarza2 | Related Lesson: | Modified: November 6, 2017

DDR Professional Recovery

Welcome to the first last in the Recovering and Deleting Files module, DDR Professional Recovery.  In this demonstration, you’ll learn how to use the tool, DDR Professional Speedy and Mighty, a file recovery tool.   Not only will you observe how [view]

By: jgalarza2 | Related Lesson: | Modified: November 5, 2017

Recovering and Deleting Files

Welcome to Module 10 of the Computer Hacking and Forensics course. This module introduces and discusses Recovering and Deleting Files, and begins discussing the differences target sources where files live and the how to recover data files from each o [view]

By: jgalarza2 | Related Lesson: | Modified: November 5, 2017

Data Acquisition module is Uptime

Our final lab demonstration for the Data Acquisition module is Uptime.  This is a quick command that most people don’t even know exist.   Uptime quick and easy to use, you’ll learn who its true value is providing the status on system uptime sta [view]

By: jgalarza2 | Related Lesson: | Modified: November 5, 2017

Data Acquisition Runtime Disk Explorer NTFS Lab

Data Acquisition Runtime Disk Explorer NTFS Lab Runtime Disk Explorer NTFS is the NTFS version of Diskexplorer. This in depth lab demonstrates an array of how Runtime Disk explorer functions for NTFS file system investigation and data recovery, and [view]

By: jgalarza2 | Related Lesson: | Modified: November 5, 2017

PromiscDetec lab

This is the PromiscDetec lab.  This is a key tool to use and one you as a forensic investigator must master, because PromiscDetec helps you determine if someone is sniffing your network.   You’ll observe the instant information it displays such a [view]

By: jgalarza2 | Related Lesson: | Modified: November 5, 2017

« First ‹ Previous 1 87 95 96 97 98 99 107 197 401 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel