< All Computer Hacking and Forensics Notes

nick | Computer and Hacking Forensics | Module 2 - Investigative Process

By: nick | Related Course: Computer Hacking and Forensics | Published: March 15, 2018 | Modified: March 16, 2018
Join Cybrary

Notepadfille recovery lab

It demonstrates the pc inspector recovery utilty.

Is a utility to inspect local drives in order to inspect all the drives that have previously lived on that drive in the past

it determines what systems, data and even temporary files have been on the target drive in question, that have appeared to have been deleted or are otherwise no longer available to be viewed/ access and you can do so virtually rifgt away

Notepadinvestigating process

we take a current law that are in place that dictate what computer forensic professionals investigates & help us abide by as companies, employees and individuals to accomplish as IT professionals & to determine forensic proffesionals

It articulates life cycle involved in investigative stages that fall within the forensic lifecycle


  • assess
  • acquire
  • analyze
  • report 
  • court


Notepadinvestigative process md5calc lab

We navigate to to the web, find & demonstrates the various ways in which you can download the md5calc utility and then it demonstrates its use, purpose and benefits

Md5calc is a very easy basic file to do for hashing files. You’ll observe how to launch the utility, hash a file and what takes place in that process


Notepadmy files lab

  • It is an excellent tool for attempting to recover data from a specific file directory.
  • It shows on how to configure as well as to use to determine the output based upon the type of search and recovery investigation you need to conduct.
  • You’ll see how the tool provides added information on specific types of files such as XML vs. a regular text file which may not have hidden information to reveal.

< All Computer Hacking and Forensics Notes
Join Cybrary

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?