Chapter 1 : Computer Forensics
Topic : Introduction to Computer Forensics and standard procedure
Content : computer forensic
21 MB ,9:52 MIN , THEORY
Chapter 1 : Computer Forensics
Topic : Introduction to Computer Forensics and standard procedure
Content : why is computer forensic important
encryption
steganography
compression
13 MB ,9:9 MIN , THEORY
Chapter 1 : Computer Forensics
Topic : computer forensic process steps
Content : steps
what things are we investigating?
what evidence can we recover at the time of investigating?
5 MB ,3:27 MIN , THEORY
Chapter 1 : Computer Forensics
Topic : Incident Verification and System Identification
Content : introduction to incident
goals of incident response
16 MB ,7:16 MIN , THEORY
Chapter 1 : Computer Forensics
Topic : Incident Verification and System Identification
Content : who is involved in the incident response process
csirt
11 MB ,7:4 MIN , THEORY
Chapter 1 : Computer Forensics
Topic : Incident Verification and System Identification
Content : incident response seven components
steps
1-pre-incident preparation
a)organization
b)CSIRT
27 MB ,18:25 MIN , THEORY
Chapter 1 : Computer Forensics
Topic : Incident Verification and System Identification
Content : 2-Detection of incidents
3-initial response
4-formulate a response strategy
considering the totality of the circumstances
considering appropriate responses
5-investigate the incident
6-reporting
document immediately
write concisely and clearly
use a standard format
use editors
7-resolution
29 MB ,14:8 MIN , THEORY
Chapter 1 : Computer Forensics
Topic : Incident Verification and System Identification
Content : taking action
legal action
administration action
incident action
20 MB ,9:20 MIN , THEORY
Chapter 1 : Computer Forensics
Topic : Incident Verification and System Identification
Content : computer security
data collection
forensic analysis
host based information
initial live response
in depth response
full live response
30 MB ,10:8 MIN , THEORY
Chapter 1 : Computer Forensics
Topic : Incident Verification and System Identification
Content : activities in initial response and phase after detection/identification of an incident
initial response phase
obtaining preliminary information
documenting steps to take
1-establishing an incident notification procedure
2-recording the details after initial detection
a-general information
b-more specific details
case notes
3-incident declaration
4- assembling the csirt
a-determining increase procedures
b-implementing notification procedures
c-scoping an incident and assembling the appropriate resources
44 MB ,28:6 MIN , THEORY
Chapter 1 : Computer Forensics
Topic : Incident Verification and System Identification
Content : 5-assigning a team leader
assigning technical staff
6-performing traditional investigative steps
a-host-based evidence
b-network-based evidence
c-other evidence
7-conducting interviews
getting contact information
interviewing system administrators
interviewing managers
interviewing end users
8-formulating a response strategy
response strategy consideration
policy verification
38 MB ,21:19 MIN , THEORY
Chapter 1 : Computer Forensics
Topic : Recovery of Erased and damaged data,
Content : Recovery of Erased and damaged data,
types of damage
29 MB ,10:24 MIN , THEORY
Chapter 1 : Computer Forensics
Topic : Recovery of Erased and damaged data,
Content : recovery deleted files on windows system
recovering unallocated space,free space and slack space
31 MB ,20:10 MIN , THEORY
Chapter 1 : Computer Forensics
Topic : Disk Imaging and Preservation
Content : disk imaging/file duplication and preservation
1-qualified forensic duplicate
2-restored image
3-mirror image
forensic duplication/disk imaging tools requirement
18 MB ,8:4 MIN , THEORY
Chapter 1 : Computer Forensics
Topic : Disk Imaging and Preservation,
Content : forensic duplication/disk imaging tools requirement
7 MB ,4:10 MIN , THEORY
Chapter 1 : Computer Forensics
Topic : Disk Imaging and Preservation
Content : creating a forensic duplicate of hard drive,
20 MB ,13:48 MIN , THEORY
Chapter 1 : Computer Forensics
Topic : Disk Imaging and Preservation
Content : creating qualified forensic duplicate of a hard drive
23 MB ,15:31 MIN , THEORY
Chapter 1 : Computer Forensics
Topic : Automated Search Techniques, Forensics Software
Content : Automated Search Techniques, Forensics Software
21 MB ,10:32 MIN , THEORY
Chapter 1 : Computer Forensics
Topic : Forensics Software
Content : Forensics Software
19 MB ,8:34 MIN , THEORY
Chapter 2 : network forensic
Topic : Introduction to Network Forensics and tracking network traffic
Content : Introduction to Network Forensics and tracking network traffic
and securing a network
25 MB ,17:37 MIN , THEORY
Chapter 2 : netwok forensic
Topic : Reviewing Network Logs
Content : Reviewing Network Logs
9 MB ,5:26 MIN , THEORY
Chapter 2 : network forensic
Topic : Network Forensics Tools,
Content : Network Forensics Tools,
9 MB ,5:26 MIN , THEORY
Chapter 2 : network forensic
Topic : Network Forensics Tools,
Content : packet sniffers
zero day attack
honeypot
24 MB ,15:27 MIN , THEORY
Chapter 2 : network forensic
Topic : Performing Live Acquisitions,Order of Volatility, Standard Procedure
Content : Performing Live Acquisitions,Order of Volatility, Standard Procedure
17 MB ,12:3 MIN , THEORY
Chapter 2 : network forensic
Topic : Order of Volatility
Content : Order of Volatility
5 MB ,3:30 MIN , THEORY
Chapter 3 : cell phone and mobile device foremsic
Topic : Overview
Content : Overview,introduction,mobile phone basics,cdma,gsm,tdma
37 MB ,18:46 MIN , THEORY
Chapter 3 : cell devices and mobile forensic
Topic : Overview
Content : iden,d-amps,edge,ofdm,4g networks
31 MB ,18:4 MIN , THEORY
Chapter 3 : cell devices and mobile forensic
Topic : overview
Content : inside mobile devices,sim cards,inside pda's
18 MB ,10:57 MIN , THEORY
Chapter 3 : cell devices and mobile forensic
Topic : Acquisition Procedures for Cell Phones and Mobile Devices
Content : Acquisition Procedures for Cell Phones and Mobile Devices,mobile forensic,sim card reader
21 MB ,12:17 MIN , THEORY
Chapter 1 : Internet Forensic
Topic : Introduction to Internet Forensics
Content : Introduction to Internet Forensics
31 MB ,10:33 MIN , THEORY
Chapter 1 : Internet Forensic
Topic : World Wide Web Threats,Hacking and Illegal access
Content : Hacking and Illegal access
19 MB ,9:7 MIN , THEORY
Chapter 1 : Internet Forensic
Topic : World Wide Web Threats, Hacking and Illegal access
Content : port scans,address spoofing,ip spoofing,arp spoofing,dns spoofing,placement of trojans,placement of tracking devices and software,
38 MB ,21:31 MIN , THEORY
Chapter 1 : iinternet forensic
Topic : World Wide Web Threats, Hacking and Illegal access
Content : placement of packet capture and protocol analyzer software,prevention and response,understanding password cracking
33 MB ,18:51 MIN , THEORY
Chapter 1 : E-mail Forensics
Topic : understanding technical protocol
Content : protocol exploits,denial of services,
45 MB ,24:16 MIN , THEORY
Chapter 1 : Internet Forensic
Topic : source routing attack
Content : application exploit, unix exploit, rootkit attacks, nfs exploits,
28 MB ,16:52 MIN , THEORY
Chapter 1 : Internet Forensic
Topic : attacking with trojans viruses and worms
Content : trojans, viruses worms ,obsence and incident transmission
21 MB ,15:12 MIN , THEORY
Chapter 2 : email forensic
Topic : Messenger Forensics: Yahoo Messenger
Content : Messenger Forensics: Yahoo Messenger,data analysis,social media forensic
12 MB ,6:21 MIN , THEORY
Chapter 1 : Internet Forensic
Topic : source routing attack
Content : router exploit, bug exploit, mail bombs, browser exploits,web spoofing, web server exploit,buffer overflows,prevention and response
52 MB ,25:22 MIN , THEORY
Chapter 2 : email forensic
Topic : e-mail analysis, e-mail headers and spoofing, Laws against e-mail Crime
Content : email clients and servers,e-mail analysis, e-mail headers and spoofing, Laws against e-mail Crime,the can-spam act,section 66A
46 MB ,31:54 MIN , THEORY
Chapter 2 : email forensic
Topic : Cookie Storage and Analysis, Analyzing Cache and temporary internet files, Web browsing activity reconstruction
Content : Cookie Storage and Analysis, Analyzing Cache and temporary internet files,windows temporary internet files,temporary files,how is the data stored, Web browsing activity reconstruction
15 MB ,11:12 MIN , THEORY
Chapter 1 : Investigation, Evidence presentation and Legal aspects of Digital Forensics
Topic : Investigation, Evidence
Content : Investigation, Evidence,types of evidence,evidence characteristics,
19 MB ,8:50 MIN , THEORY
Chapter 1 : Investigation, Evidence presentation and Legal aspects of Digital Forensics
Topic : Authorization to collect the evidence, Acquisition of Evidence
Content : Authorization to collect the evidence, Acquisition of Evidence
33 MB ,14:10 MIN , THEORY
Chapter 1 : Investigation, Evidence presentation and Legal aspects of Digital Forensics
Topic : Authentication of the evidence, Analysis of the evidence
Content : Authentication of the evidence, Analysis of the evidence
10 MB ,2:21 MIN , THEORY
Chapter 1 : Investigation, Evidence presentation and Legal aspects of Digital Forensics
Topic : Reporting on the findings, Testimony
Content : Reporting on the findings, Testimony,report goals,report writing guidelines,preparing for testimony,documenting and preparing evidence,reviewing your role,preparing technical definitions
12 MB ,9:21 MIN , THEORY
Chapter 2 : Introduction to Legal aspects of Digital Forensics
Topic : Laws & regulations,Information Technology Act
Content : Laws & regulations,Information Technology Act,criminal law,civil law,regulatory law,levels of law
11 MB ,9:10 MIN , THEORY
Chapter 2 : Introduction to Legal aspects of Digital Forensics
Topic : Giving Evidence in court, Case Study Cyber Crime cases
Content : levels of culpability:internet,knowledge,recklessness,negligence,level and burden of proof criminal versus civil cases
10 MB ,7:41 MIN , THEORY
Chapter 2 : Introduction to Legal aspects of Digital Forensics
Topic : Information Technology Act, Giving Evidence in court Case Study Cyber Crime cases, Case Study Cyber Crime cases
Content : Information Technology Act, Giving Evidence in court,testifying in a cybercrime case,Cyber Crime cases, Case Study Cyber Crime cases
10 MB ,7:54 MIN , THEORY
Chapter 1 : Investigation, Evidence presentation and Legal aspects of Digital Forensics
Topic : forensic duplications
Content : qualified forensic duplicate,restored image,mirror image,,creating a forensic tool duplicate of hard drive
18 MB ,8:4 MIN , THEORY
Chapter 1 : Investigation, Evidence presentation and Legal aspects of Digital Forensics
Topic : recovery files
Content : recovery files
31 MB ,20:10 MIN , THEORY