CYS4210 - Digital Forensics in Cybersecurity

(ANC-CYS4210.AB1)
Lessons
Lab
TestPrep
Get A Free Trial

Skills You’ll Get

1

Introduction to Digital Forensics, Windows Operating and File Systems

  • Popular Myths about Computer Forensics
  • Types of Digital Forensic Evidence Recovered
  • What Skills Must a Digital Forensics Investigator Possess?
  • The Importance of Digital Forensics
  • Job Opportunities
  • A History of Digital Forensics
  • Training and Education
  • Physical and Logical Storage
  • Paging
  • File Conversion and Numbering Formats
  • Operating Systems
  • Windows Registry
  • Microsoft Office
  • Microsoft Windows Features
2

Computer Hardware, Acquiring Evidence, and Online Investigations

  • Hard Disk Drives
  • Cloning a PATA or SATA Hard Disk
  • Removable Memory
  • Lab Requirements
  • Private-Sector Computer Forensics Laboratories
  • Computer Forensics Laboratory Requirements
  • Extracting Evidence from a Device
  • Skimmers
  • Steganography
  • Working Undercover
  • Dark Web Investigations
  • Virtual Currencies
  • Website Evidence
  • Background Searches on a Suspect
  • Online Crime
  • Capturing Online Communications
  • Edge Web Browser
3

Documenting the Investigation, Digital Evidence, Network Forensics and Incident Response

  • Obtaining Evidence from a Service Provider
  • Documenting a Crime Scene
  • Seizing Evidence
  • Documenting the Evidence
  • Using Tools to Document an Investigation
  • Writing Reports
  • Using Expert Witnesses at Trial
  • History and Structure of the United States Legal System
  • Evidence Admissibility
  • Constitutional Law
  • When Computer Forensics Goes Wrong
  • Structure of the Legal System in the European Union (E.U.)
  • Privacy Legislation in Asia
  • The Tools of the Trade
  • Networking Devices
  • Understanding the OSI Model
  • Introduction to VoIP
  • Incident Response (IR)
  • STIX, TAXII, and Cybox
  • Advanced Persistent Threats
  • Investigating a Network Attack
4

Mobile Forensics, Mobile App Investigations, and Mac Forensics

  • The Cellular Network
  • Handset Specifications
  • Mobile Operating Systems
  • Standard Operating Procedures for Handling Handset Evidence
  • Handset Forensics
  • Manual Cellphone Examinations
  • Global Satellite Service Providers
  • Legal Considerations
  • Other Mobile Devices
  • Documenting the Investigation
  • Static Versus Dynamic Analysis
  • Dating Apps
  • Rideshare Apps
  • Communication Apps
  • A Brief History
  • Apple Wi-Fi Devices
  • Macintosh File Systems
  • Macintosh Operating Systems
  • Apple Mobile Devices
  • Performing a Mac Forensics Examination
  • Case Studies
5

Photograph and Internet of Things Forensics and Emergent Technologies

  • National Center for Missing and Exploited Children (NCMEC)
  • Project VIC
  • Case Studies
  • Understanding Digital Photography
  • Examining Picture Files
  • Evidence Admissibility
  • Case Studies
  • 5G
  • Wi-Fi 6
  • Wi-Fi Mesh Networks
  • Shodan
  • Mirai Botnet
  • Cryptocurrency Mining
  • Alexa
  • Micro-Chipping
  • Fitness Trackers
  • Apple Watch
  • Action Cameras
  • Police Safety
  • Police Vehicles
  • Vehicle Forensics
  • Low-Tech Solution for High-Tech Seizures
  • Silk Road
  • Las Vegas Massacre
  • Zacharias Moussaoui
  • BTK (Bind Torture Kill) Serial Killer
  • Cyberbullying
  • Sports

1

Introduction to Digital Forensics, Windows Operating and File Systems

  • Displaying Metadata Information
  • Using a Hex Editor
2

Computer Hardware, Acquiring Evidence, and Online Investigations

  • Verifying RAM Usage
  • Using GREP
  • Using the dd Utility
  • Using a Numeric IP Address to Locate a Web Server
3

Documenting the Investigation, Digital Evidence, Network Forensics and Incident Response

  • Analyzing Traffic Captured from Site Survey Software
  • Capturing Packets Using Wireshark
  • Finding a MAC Address of a System
  • Getting Information about DNS (Layer 4)
4

Mobile Forensics, Mobile App Investigations, and Mac Forensics

  • Setting Up a VPN in Android
  • Viewing the iOS Version of an iPhone
5

Photograph and Internet of Things Forensics and Emergent Technologies

  • Getting Information about UDP Ports
  • Getting Information about TCP Ports
  • Getting Information about the Current Connection Statistics of TCP
  • Obtaining IP Route Information from the IP Routing Table

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

Related Courses

All Courses
scroll to top