CYS4210 - Digital Forensics in Cybersecurity

(ANC-CYS4210.AB1)
Lessons
Lab
TestPrep
Get A Free Trial

Skills You’ll Get

1

Introduction to Digital Forensics, Windows Operating and File Systems

  • Popular Myths about Computer Forensics
  • Types of Digital Forensic Evidence Recovered
  • What Skills Must a Digital Forensics Investigator Possess?
  • The Importance of Digital Forensics
  • Job Opportunities
  • A History of Digital Forensics
  • Training and Education
  • Physical and Logical Storage
  • Paging
  • File Conversion and Numbering Formats
  • Operating Systems
  • Windows Registry
  • Microsoft Office
  • Microsoft Windows Features
2

Computer Hardware, Acquiring Evidence, and Online Investigations

  • Hard Disk Drives
  • Cloning a PATA or SATA Hard Disk
  • Removable Memory
  • Lab Requirements
  • Private-Sector Computer Forensics Laboratories
  • Computer Forensics Laboratory Requirements
  • Extracting Evidence from a Device
  • Skimmers
  • Steganography
  • Working Undercover
  • Dark Web Investigations
  • Virtual Currencies
  • Website Evidence
  • Background Searches on a Suspect
  • Online Crime
  • Capturing Online Communications
  • Edge Web Browser
3

Documenting the Investigation, Digital Evidence, Network Forensics and Incident Response

  • Obtaining Evidence from a Service Provider
  • Documenting a Crime Scene
  • Seizing Evidence
  • Documenting the Evidence
  • Using Tools to Document an Investigation
  • Writing Reports
  • Using Expert Witnesses at Trial
  • History and Structure of the United States Legal System
  • Evidence Admissibility
  • Constitutional Law
  • When Computer Forensics Goes Wrong
  • Structure of the Legal System in the European Union (E.U.)
  • Privacy Legislation in Asia
  • The Tools of the Trade
  • Networking Devices
  • Understanding the OSI Model
  • Introduction to VoIP
  • Incident Response (IR)
  • STIX, TAXII, and Cybox
  • Advanced Persistent Threats
  • Investigating a Network Attack
4

Mobile Forensics, Mobile App Investigations, and Mac Forensics

  • The Cellular Network
  • Handset Specifications
  • Mobile Operating Systems
  • Standard Operating Procedures for Handling Handset Evidence
  • Handset Forensics
  • Manual Cellphone Examinations
  • Global Satellite Service Providers
  • Legal Considerations
  • Other Mobile Devices
  • Documenting the Investigation
  • Static Versus Dynamic Analysis
  • Dating Apps
  • Rideshare Apps
  • Communication Apps
  • A Brief History
  • Apple Wi-Fi Devices
  • Macintosh File Systems
  • Macintosh Operating Systems
  • Apple Mobile Devices
  • Performing a Mac Forensics Examination
  • Case Studies
5

Photograph and Internet of Things Forensics and Emergent Technologies

  • National Center for Missing and Exploited Children (NCMEC)
  • Project VIC
  • Case Studies
  • Understanding Digital Photography
  • Examining Picture Files
  • Evidence Admissibility
  • Case Studies
  • 5G
  • Wi-Fi 6
  • Wi-Fi Mesh Networks
  • Shodan
  • Mirai Botnet
  • Cryptocurrency Mining
  • Alexa
  • Micro-Chipping
  • Fitness Trackers
  • Apple Watch
  • Action Cameras
  • Police Safety
  • Police Vehicles
  • Vehicle Forensics
  • Low-Tech Solution for High-Tech Seizures
  • Silk Road
  • Las Vegas Massacre
  • Zacharias Moussaoui
  • BTK (Bind Torture Kill) Serial Killer
  • Cyberbullying
  • Sports

1

Introduction to Digital Forensics, Windows Operating and File Systems

  • Displaying Metadata Information
  • Using a Hex Editor
2

Computer Hardware, Acquiring Evidence, and Online Investigations

  • Verifying RAM Usage
  • Using GREP
  • Using the dd Utility
  • Using a Numeric IP Address to Locate a Web Server
3

Documenting the Investigation, Digital Evidence, Network Forensics and Incident Response

  • Analyzing Traffic Captured from Site Survey Software
  • Capturing Packets Using Wireshark
  • Finding a MAC Address of a System
  • Getting Information about DNS (Layer 4)
4

Mobile Forensics, Mobile App Investigations, and Mac Forensics

  • Setting Up a VPN in Android
  • Viewing the iOS Version of an iPhone
5

Photograph and Internet of Things Forensics and Emergent Technologies

  • Getting Information about UDP Ports
  • Getting Information about TCP Ports
  • Getting Information about the Current Connection Statistics of TCP
  • Obtaining IP Route Information from the IP Routing Table

Related Courses

All Courses
scroll to top