Detailed Course Outline
- Introduction
- Lesson Objectives
- Introductions (Instructor)
- Introductions (Students)
- Disclaimers
- Notice
- Course Schedule
- Student Guide (Layout)
- Introduction to Computer Forensics
- Course Objectives
- Computer Forensic Incidents
- Lesson Objectives
- The Legal System
- Criminal Incidents
- Civil Incidents
- Computer Fraud
- Internal Threats
- Investigative Challenges
- Common Frame of Reference
- Media Volume
- Investigation Process
- Lesson Objectives
- Investigating Computer Crimes
- Prior to the Investigation
- Forensics Workstation
- Building Your Team of Investigators
- Who is involved in
- Computer Forensics?
- Decision Makers and Authorization
- Risk Assessment
- Forensic Investigation Toolkit
- Investigation Methodology
- Preparing for an Investigation
- Search Warrant
- Forensic Photography
- Preliminary Information
- First Responder
- Collecting Physical Evidence
- Collecting Electronic Evidence
- Guideline for Acquiring Electronic Evidence
- Securing the Evidence
- Managing the Evidence
- Chain of Custody
- Duplicate the Data
- Verify the Integrity of the Image
- Recover Last Data
- Data Analysis
- Data Analysis Tools
- Assessing the Evidence
- Assessing the Case
- Location Assessment
- Best Practices
- Documentation
- Gathering and Organizing Information
- Writing the Report
- Expert Witness
- Closing the Case
- OS Disk Storage Concepts
- Lesson Objectives
- Disk Based Operating Systems
- OS / File Storage Concepts
- Disk Storage Concepts
- Digital Acquisition and Analysis
- Lesson Objectives
- Digital Acquisition
- Digital Acquisition Procedures
- Digital Forensic Analysis Tools
- Forensic Examination Protocols
- Lesson Objectives
- Forensic Examination Protocols
- Forensic Examination
- Digital Evidence Protocols
- Lesson Objectives
- Digital Evidence Concepts
- Digital Evidence Categories
- Digital Evidence: Admissibility
- CFI Theory
- Lesson Objectives
- Computer Forensic Investigative
- Theory
- Digital Evidence Presentation
- Lesson Objectives
- Digital Evidence Presentation
- Digital Evidence
- Digital Evidence: Hearsay
- Digital Evidence: Summar
- Computer Forensics Lab Protocols
- Lesson Objectives
- Overview
- Quality Assurance
- Standard Operating Procedures
- Reports
- Peer Review
- Who should review?
- Peer Review
- Consistency
- Accuracy
- Research
- Validation
- Relevance
- Peer Review
- Annual Review
- Deviation
- Lab Intake