7 hours 33 minutes
greetings and welcome back to Siberia is calm. Tia Certified van Security practice. Ners certification. Preparation course
we go hurting our discussion of marginal 11 which is Tyler. Instant response.
He had objectives, which encompasses margin. Um 11. Let's not turn on, tend to our discussion off Section three. Understand and support forensic investigations
before we get going. This particular presentation. It's most appropriate if we begin with this pre assessment question, and the question is as follows.
Which of the following help to prove that collect Everything has been control. Senses were collected. Is it eh?
Chain of custody.
See a decaf application or audit logs?
If you said like today, you're absolutely correct, it's called a chain of custody.
Let's begin by first are taking a look at an overview in terms up physical forensic
when you're like a dental forensics. In fact, it's the process of uncover interpreting electric data. The goal Other prices to preserve any evidence is most original form while performer a structure investigation by collecting, identified and validate the desert information for the purpose of reconstructing
forensic investigations in the morning Gavin and analyzing all crime related physical evidence in order to come to a conclusion about a suspect
investigation, will look at blood. They could look at fluid fingerprints, residue, hard drives. Computers are other technology to establish how a crime took place.
This brings us to forensic principles. Now when you look at visible forensics, basically it's a deal specifically the principle that holds that any perpetrator off and choose and leaves behind a trace evidence within the system.
This trace evidence may be used to identify
in terms of gas lines and forensic investigation.
First of all, you would identify the evidence. Other words, you would have responded. Individuals must begin document everything that they five at the incident scene. That will should happen during an investigation. There was record effects, and they present themselves, such as the location devices, witness statements, obvious evidence and suspected evidence
evidence owners as well as the nature of the incident.
Then we come to collecting or choir into evidence.
You must adhere to a proper
evidence collection and documentation techniques while minimizing incident. Scene contamination, obviously is very important,
become to examine all analyzing evidence. The evidence is investigated, analyzed using sound scientific tests and methods which are, except we're both in the forensic community as well as a court of law.
Fourth of Presentation of Evidence and Findings. Forensic examiners must present their evidence findings and professional opinion and documentation, such as court presentations and legal brief.
Quite often, forensic investigators are required to testify as expert witnesses,
evidence collection and preservation.
Other words written, looking collect Now when you think about collected in terms of evidence, that means to identify you must label you must record and acquire data from the possible sources of relevant data while following guidelines and procedures that are preserved.
What we want to do, in fact, preserve the oboe integrity off the data
preservation. Other words wouldn't prevent the prosecutor's evidence being what
this destruction occur, or any type of alteration of the evidence. When investigation little Gates is neither in the process or might come to pass in the future, we'll make sure we preserve that evidence
in the state. That it was at the time of the particular investigation,
therefore, is the evidence lifecycle. Here's the process. First, all you collect or sees the evidence,
then you transport the evidence not doing the transportation of evidence. We must ensure that no point in time the chain of custody is broken. We almost sure we protect the store, the evidence and then sequentially analyze the evidence
not for the digital forensic techniques of some techniques that need to be a well. First of all, let's take a look. The term called bit screen image.
When you think about making a bit screen image of this, it's a clone copy of it.
It compass virtually everything, including a drive including its sectors that clusters, which makes it possible to tree fouls up when it lead it. From the drive,
we have Martin of the Longs. This would have busted identify security events that occurred on might occur.
Data recovery is a process of savaging, retrieving or inaccessible loss, corrupted damage or format data from secondary storage, removable media or files when the data stored in them cannot be assessed in a normal way, so we won't have a method by which want to uncover that information.
Then we have a fire header. Investigation is the first part of the fire sculpture, which contained coded information that the computer reads when it first opens the foul,
while as a follow stitch it is. There's a last week character that appear in the right of the period of the foul. The fire would be more reliable because they can change the file extension on Lee filed by simply save it with a different file extension. So we want to investigate the fire head as well.
And the next night we have a list of some different types of what we call disco forensic tools that we have available out there.
Here in this chart at Mr Name
I list a platform.
The license is was a brief description. Let's take a look at one of these here.
First of all, I'll take a look at FT cake.
FBK works on a oneness platform
He has a multiple is a motor purpose, too.
A f t kill for institute is a court cited digital investigation platform, built for speed sto building as well, its ease of use.
Another thing that's very important, particularly you under Gordon, are involved in investigation is a term called chain of custody.
Our chain of custody referred to a forensic principle whereby each movement or transferred that must be recorded and law appropriately at no time must have changed his rub it if it iss
what happens? The evidence of no use. Every should be appropriate identified, including the circumstances under which it was collected.
Who collected it? A detailed description of other important information. In most cases, evidence is packed in what we call poly bags for transport to the forensic laboratory or the storage location.
Now we go into the process of actually analyse important assessment results.
Wanted. First forensic examiner is performing the examination of evidence they will allow the character ever is to leave various suppositions and potential collusion. Possibility.
This is interpretation process that the forensic, as we used to determine the importance or the significant various pieces off the evidence information
This race is now two are post assessment questions for this particular section here,
and the question is as follows
which one of the father is most likely to be performed during a feedback loop
in an instant. Handleman process is eight. Before my lesson learned review be escalation,
or D chain of custody.
The quite responses. You will perform what we call a lesson learned review.
Now, during this particular presentation, you specifically discuss, understand and support a forensic investigation.
In our upcoming presentation, we've been moving on to Section four, which is titled Understand and Support Business Continuity, or B C. P and a disaster recovery plan.
Look forward to seeing your future training present patients.
In this course, you will learn all of the domains and concepts associated with the CompTIA Advanced Security Practitioner CAS-003 CASP+ Exam. Through this course you will be fully prepared to sit for your CompTIA A+ Exam!