COMPUTER FORENSICS (EFFECTIVE ) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE CATE STUDENT REPORTING PROCEDURES MANUAL)
|
|
|
- Lesley Sherman
- 10 years ago
- Views:
Transcription
1 COMPUTER FORENSICS (EFFECTIVE ) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE CATE STUDENT REPORTING PROCEDURES MANUAL) COURSE DESCRIPTION: Computer Forensics is focused on teaching students how to gather evidence and prevent cybercrime using computer, criminology, law, digital security, and investigative techniques. Students will learn to collect, preserve, present, and prepare computerbased evidence for the purposes of criminal law enforcement or civil litigation. Activities will define the central roles of the computer forensic practitioner involved in investigating computer crime scenes and torts involving computers. Students will be prepared to assist in the formulation and implementation of organizational computer forensics preparedness policies, to determine the necessity for forensic procedures, extend governance processes to allow for proper future forensic investigations, and be contributing members of computer forensics investigation teams. OBJECTIVE: Given the necessary equipment, supplies, and appropriate software, the student will be prepared to successfully complete the standards necessary for national credentials. INDUSTRY CERTIFICATIONS: Refer to the following Web link to obtain information for EnCE certification exams. COURSE CREDIT: 1 or 2 Carnegie units RECOMMENDED GRADE LEVELS: PREREQUISITE: None Must be teacher approved COMPUTERS REQUIRED: One computer per student RECOMMENDED SOFTWARE RESOURCES: Access Data Ultimate Toolkit, Encase Guidance Software, ProDiscover Basics, X-Waves Forensic Software, and Paraben A. SAFETY AND ETHICS 1. Identify major causes of work-related accidents in offices. 2. Describe the threats to a computer network, methods of avoiding attacks, and options in dealing with virus attacks. 3. Identify potential abuse and unethical uses of computers and networks. November
2 4. Explain the consequences of illegal, social, and unethical uses of information technologies (e.g., piracy; illegal downloading; licensing infringement; inappropriate uses of software, hardware, and mobile devices). 5. Differentiate between freeware, shareware, and public domain software copyrights. 6. Discuss computer crimes, terms of use, and legal issues such as copyright laws, fair use laws, and ethics pertaining to scanned and downloaded clip art images, photographs, documents, video, recorded sounds and music, trademarks, and other elements for use in Web publications. 7. Identify netiquette including the use of , social networking, blogs, texting, and chatting. 8. Describe ethical and legal practices in business professions such as safeguarding the confidentiality of business-related information. 9. Discuss the importance of cyber safety and the impact of cyber bullying. B. EMPLOYABILITY SKILLS 1. Identify positive work practices (e.g., appropriate dress code for the workplace, personal grooming, punctuality, time management, organization). 2. Demonstrate positive interpersonal skills (e.g., communication, respect, teamwork). C. STUDENT ORGANIZATIONS 1. Explain how related student organizations are integral parts of career and technology education courses. 2. Explain the goals and objectives of related student organizations. 3. List opportunities available to students through participation in related student organization conferences/competitions, community service, philanthropy, and other activities. 4. Explain how participation in career and technology education student organizations can promote lifelong responsibility for community service and professional development. D. INTRODUCTION TO COMPUTER FORENSICS 1. Define forensics and computer forensics. 2. List the public the public and private sector organizations that employ computer forensics examiners. 3. List the areas of expertise required of a computer forensics examiner. E. COMPUTER INVESTIGATION 1. Explain the purpose of an investigation computer. 2. Create and rename folders. November
3 3. Assign clear, understandable names to folders and files. 4. Organize work folders. 5. Identify the common application programs required on an investigation computer. 6. Adjust Windows Explorer options. F. MEMORY STORAGE MEDIA 1. Explain the differences between magnetic, optical, and transistor memory storage media. 2. Describe the types of magnetic memory storage media used in computers. 3. Explain how to properly handle magnetic memory storage media. 4. Describe the reason to use and how to set up an anti-static work area. 5. Identify different types of floppy diskettes and floppy disk drives. 6. Distinguish between various types of hard drives. 7. List the types of optical memory storage media used in computers. 8. List the types of transistor memory storage media used in computers. G. NUMBERING SYSTEMS 1. Understand the decimal numbering system. 2. Describe the binary numbering system. 3. Describe the binary coded decimal (BCD) numbering system. 4. Describe the hexadecimal numbering system. 5. Explain data size. 6. Understand endianness, big-endian, little-endian, and middle endian. H. ASCII AND UNICODE CHARACTERS 1. Understand ASCII encoding. 2. Explain Unicode encoding. 3. Differentiate between UTF-8 and UTF-16 encoding. 4. Recognize ASCII, UTF-8, and UTF-16 data. 5. Discuss the functions of a file archive program. 6. Describe why and when a hex editor should be used. 7. Explain how to use the Windows Character Map. I. EXTERNAL HARDWARE INTERFACES 1. List the different types of external hardware interfaces. 2. Explain the USB standards. 3. Describe the FireWire standards. 4. Identify parallel ports and cable connectors. 5. Distinguish a SATA port from an esata port. 6. Recognize an infrared port. November
4 J. HARD DISK DRIVES 1. List hard disk drive specifications. 2. Describe the electro-mechanical components in a hard drive. 3. Identify the different types of hard drive interfaces. 4. Explain how a hard drive operates. 5. Understand the purpose of a hard drive jumper. 6. List the various encoding schemes used in hard drives. K. MULTIPLE DISK ARRAYS 1. Discuss the need for a fault tolerant system. 2. List the two types of multiple disk arrays. 3. Explain the purpose of a RAID system. 4. Describe the disadvantage of online storage services. L. FORMATTING HARD DRIVES 1. Explain the purpose of Windows Disk Management. 2. List the steps to format a hard drive. 3. Describe how to create a hard drive partition. M. WINDOWS FILE SYSTEMS 1. Identify the FAT filing systems. 2. Describe NTFS. 3. Describe the functions of basic DOS commands. N. FORENSIC BRIDGES 1. Explain the need for memory storage media/computer bridges. 2. Describe a forensic bridge. 3. Compare the read only and read/write modes of a forensic bridge. O. SEARCH WARRANTS & SEIZURES 1. Describe the purpose of search and seizure laws. 2. Explain the basics of computer search warrants. 3. Describe a voluntary consent to search. 4. Identify the steps to prepare for a computer search. 5. List the first responder guidelines. November
5 P. EVIDENCE CONTROL 1. Explain the procedure to identify digital evidence. 2. Describe how to use evidence bags. 3. List the items that must be sealed on a seized computer. 4. Describe the procedure to maintain a valid chain of custody. Q. DATA IMAGE ACQUISITION 1. Explain the difference between standard and forensic disk duplicators. 2. List the functions of the Tableau TD1 Forensic Duplicator. 3. Discuss the types of disk duplication. Identify the common application programs required on an investigation computer. 4. Adjust Windows Explorer options. 5. Describe the disk information stored on a hard drive. 6. Explain the disk-to-disk image acquisition process. 7. List the information contained in a data acquisition log. 8. Discuss how to use a forensic bridge to copy an image form an image drive to an investigation computer. R. DISK WIPING 1. List the methods available to erase data. 2. Describe the effectiveness of each data erasure method. 3. Explain how disk wiping works. S. SOFTWARE WRITE-BLOCKING 1. Describe the need for write-blocking protection. 2. Explain how to make a backup copy of the Windows Registry. 3. Explain how to modify the Windows Registry for USB write-blocking. 4. Describe how to automate USB write-blocking using the Registry. 5. List the types of write-blocking. 6. Distinguish the differences between the types of write-blocking. T. HARDWARE WRITE-BLOCKING 1. Describe the need for hardware write-blocking protection. 2. Compare the terms write-blocker and forensic bridge. 3. Explain how to use a forensic USB bridge. November
6 U. FORENSIC SOFTWARE 1. Explain how to change settings in software programs. 2. Describe the basics of computer forensic investigation software. 3. List the features of the ProDiscover Basic program. V. DIGITAL EVIDENCE ANALYSIS 1. Explain the process of viewing files contained in an image. 2. Discuss the criteria for recovering a deleted file. 3. List the types of file information searches. 4. Describe how to determine the keywords to use when searching for data. 5. Explain how to save a recovered file. 6. Discuss the importance of evidence analysis reports. W. FILE RECOVERY AND DOCUMENTATION 1. List the steps used to create an evidence case project in forensic software. 2. Describe how to add project images. 3. Explain the cluster view and content view. 4. Discuss how to identify files for which to search. 5. Summarize the file recovery process. 6. Explain how to document a recovered file. 7. Describe how to scan a file for viruses. 8. Explain how to view an evidence file in the appropriate application program. X. FORENSIC WORKSTATIONS 1. List the hardware in a typical forensic workstation. 2. List the forensic software on a typical forensic workstation. 3. Explain the major functions of a forensic workstation. 4. Contrast a standard bay and hot-swappable bay. 5. Describe how to switch between operating systems on a forensic workstation. Y. FORENSIC SOFTWARE 1. Explain the basic functions of forensic software. 2. List the four basic phases of working a case. 3. Describe how to start a new case. 4. Discuss the purpose of previewing a device. 5. List the steps needed to acquire an image. 6. List the variations that must be taken into account before searching for a person s name. November
7 7. Describe the forensic search process. 8. Explain how to produce a report. Z. GRAPHIC FILES 1. List the types of graphic software. 2. Contrast the different types of graphic files. 3. Explain the difference between bitmap and raster graphic images. 4. Discuss the advantages and disadvantages of bitmap and vector graphic images. 5. Explain Metafile graphic files. 6. List the types of digital camera graphic files. 7. Describe how to view and identify graphic file information. 8. Explain Magic Numbers. 9. Describe the principles of file compression. 10. List the principles of PNG file chunks and their contents. 11. Describe the contents of metadata. 12. Differentiate the types of JPEG file markers. AA. GRAPHIC FILE RECOVERY 1. Discuss the challenges when generating a graphic files of interest port. 2. Differentiate the types of file carving. 3. Summarize how to perform Header/Maximum File Size Carving. 4. Explain the process to recover clusters. 5. Describe how to clean up recovered clusters. 6. Summarize how to recover a fragmented file. 7. Explain how to select and recover a file with noncontiguous clusters. BB. COMPRESSED DATA RECOVERY 1. Differentiate archive and compressed files. 2. List compression methods. 3. Explain how to identify an archive or compressed file. 4. List popular archive and compression file formats. 5. List popular archive and compression file programs. 6. Explain how to use the Windows Zip Utility. 7. List the Magic Numbers for popular formats. 8. Describe how to extract a file. CC. PASSWORD RECOVERY 1. Differentiate passwords and encryption. 2. Explain plaintext. November
8 3. Describe the difference between password protected files and password protected operating systems. 4. Characterize various purposes of password recovery software. 5. Discuss the types of hacking. 6. List the most popular password recovery software. 7. Describe the limitations of password recovery software. 8. Recognize weak and strong passwords. 9. Summarize the types of password attack methods. DD. WEB ACTIVITY RECOVERY 1. List the most common Web browsers. 2. Describe how to recover Internet Explorer Web activity. 3. Explain how to obtain a user s Web activity timeline. 4. Describe where FireFox stores a Web browser s activity. EE. RECOVERY 1. Differentiate the Web-based and computer-based clients. 2. Explain how an server functions. 3. List the different mail server transmission methods. 4. Describe the methods used to recover s. 5. List the popular clients. 6. Explain how to copy and message for use in a report. 7. Describe the procedure to view an header. 8. Discuss the events that prompted the Sarbanes-Oxley Act. 9. Explain the importance of an Exchange Server Message Tracking Log. 10. Describe the procedure to recover messages. 11. Explain how to recover an attachment. November
Web Design and Development I a.k.a. Fundamentals of Web Design and Development
CompuScholar, Inc. Alignment to South Carolina Web Design and Development I Standards South Carolina Course Details: Course Name: Web Design and Development I a.k.a. Fundamentals of Web Design and Development
Information Technology Career Cluster Advanced Cybersecurity Course Number: 11.48200
Information Technology Career Cluster Advanced Cybersecurity Course Number: 11.48200 Course Description: Advanced Cybersecurity is designed to provide students the advanced concepts and terminology of
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Introduction The Computer Forensics and Investigation course presents methods to properly conduct a computer forensics investigation
ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING
ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING MODULE A INTRODUCTION TO COMPUTER FORENSICS AND NVESTIGATIONS A1.0 Explain concepts related to computer forensics. A1.1 This module is measured
WEB PAGE DESIGN AND DEVELOPMENT 2 COURSE CODE: 5033 (COURSE NAME CHANGES TO ADVANCED WEB DESIGN AND DEVELOPMENT IN 2016-17)
WEB PAGE DESIGN AND DEVELOPMENT 2 COURSE CODE: 5033 (COURSE NAME CHANGES TO ADVANCED WEB DESIGN AND DEVELOPMENT IN 2016-17) COURSE DESCRIPTION: This advanced course is designed to provide students with
MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
Computer Forensic Capabilities
Computer Forensic Capabilities Agenda What is computer forensics? Where to find computer evidence Forensic imaging Forensic analysis What is Computer Forensics? The preservation, identification, extraction,
CYBER FORENSICS (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 CYBER FORENSICS (W/LAB) Course Syllabus Course Number: CSFS-0020 OHLAP Credit: Yes OCAS Code: 8134 Course Length: 130 Hours Career Cluster: Information
EC-Council Ethical Hacking and Countermeasures
EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
EnCase 7 - Basic + Intermediate Topics
EnCase 7 - Basic + Intermediate Topics Course Objectives This 4 day class is designed to familiarize the student with the many artifacts left behind on Windows based media and how to conduct a forensic
2! Bit-stream copy. Acquisition and Tools. Planning Your Investigation. Understanding Bit-Stream Copies. Bit-stream Copies (contd.
Acquisition and Tools COMP 2555: Principles of Computer Forensics Autumn 2014 http://www.cs.du.edu/2555 1 Planning Your Investigation! A basic investigation plan should include the following activities:!
Digital Forensics. Tom Pigg Executive Director Tennessee CSEC
Digital Forensics Tom Pigg Executive Director Tennessee CSEC Definitions Digital forensics Involves obtaining and analyzing digital information as evidence in civil, criminal, or administrative cases Analyze
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations, Second Edition Chapter 4 Current Computer Forensics Tools Objectives Understand how to identify needs for computer forensics tools Evaluate the requirements
CCE Certification Competencies
CCE Certification Competencies May 10, 2012 Page 1 The Certified Computer Examiner (CCE) has evolved into one of the most desired certifications in the computer forensics industry. The certification is
Hands-On How-To Computer Forensics Training
j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE
information security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
Chapter 7 Securing Information Systems
1 Chapter 7 Securing Information Systems LEARNING TRACK 3: COMPUTER FORENSICS For thirty years, a serial murderer known as the BTK killer (standing for bind, torture, and kill) remained at large in Wichita,
Incident Response and Computer Forensics
Incident Response and Computer Forensics James L. Antonakos WhiteHat Forensics Incident Response Topics Why does an organization need a CSIRT? Who s on the team? Initial Steps Detailed Project Plan Incident
Information Technology Career Cluster Introduction to Digital Technology Course Number 11.41500
Information Technology Career Cluster Introduction to Digital Technology Course Number 11.41500 Course Description Introduction to Digital Technology is the foundational course for Web & Digital Communications,
Information Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 13 Business Continuity
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 13 Business Continuity Objectives Define environmental controls Describe the components of redundancy planning List disaster recovery
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices Introduction As organizations rely more heavily on technology-based methods of communication, many corporations
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations, Second Edition Chapter 9 Data Acquisition Objectives Determine the best acquisition method Plan data-recovery contingencies Use MS-DOS acquisition tools
Computer and Information Science
Computer and Information Science www.odessa.edu/dept/computer Faculty: Katrieva Jones- Munroe, chair The computer information systems curriculum provides students with practical, job- related computer
PREREQUISITE(S): CTS 1131, CTS 1133 and CTS 1120
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CAP 2140 COURSE TITLE: Data Forensics I PREREQUISITE(S): CTS 1131, CTS 1133 and CTS 1120 COREQUISITE(S):
Technology (Information Technology) Benchmarks
Technology (Information Technology) Benchmarks Kindergarten A. With teacher support, demonstrate knowledge of ergonomics and electrical safety when using computers. B. With teacher support, explain that
Course Title: Computer Forensic Specialist: Data and Image Files
Course Title: Computer Forensic Specialist: Data and Image Files Page 1 of 9 Course Description The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute
Certified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
Certified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
Guidelines on Digital Forensic Procedures for OLAF Staff
Ref. Ares(2013)3769761-19/12/2013 Guidelines on Digital Forensic Procedures for OLAF Staff 1 January 2014 Introduction The OLAF Guidelines on Digital Forensic Procedures are internal rules which are to
Overview of Computer Forensics
Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National
Digital Forensics. Larry Daniel
Digital Forensics Larry Daniel Introduction A recent research report from The Yankee Group found that 67.6 percent of US households in 2002 contained at least one PC The investigators foresee three-quarters
CDFE Certified Digital Forensics Examiner (CFED Replacement)
Course: CDFE Certified Digital Forensics Examiner (CFED Replacement) Description: Price: $3,450.00 Category: Popular Courses Duration: 5 days Schedule: Request Dates Outline: COURSE OVERVIEW Computer Forensics
Computer Hacking Forensic Investigator v8
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Computer Hacking Forensic Investigator v8 Course Description: EC-Council releases the most advanced Computer
Ans.: You can find your activation key for a Recover My Files by logging on to your account.
Faqs > Recover Q1. I lost my activation key Ans.: You can find your activation key for a Recover My Files by logging on to your account. Q2. I purchased on-line, when will my activation key be sent to
ITM 642: Digital Forensics Sanjay Goel School of Business University at Albany, State University of New York
INSTRUCTOR INFORMATION Name: Sanjay Goel Email: [email protected] Phone: (518) 442-4925 Office Location: BA 310b, University at Albany Office Hours: TBD CLASS INFORMATION Time: N/A Location: Online Dates:
Introduction to Computer Forensics ITP 499 (3 Units)
Introduction to Computer Forensics ITP 499 (3 Units) Description In 2007, the FBI reported that over 200 major companies reported a loss of over 60 million dollars due to computer crime. Computers are
CTC 328: Computer Forensics
FALL 2010 CSUDH COMPUTER SCIENCE DEPARTMENT CTC 328: Computer Forensics Instructor: Adam Kaplan, Ph.D. E-Mail: [email protected] Office: NSM E-117 WWW (Blackboard Site): http://toro.csudh.edu Class Meetings:
ITU Session Four: Device Imaging And Analysis. Mounir Kamal Q-CERT
ITU Session Four: Device Imaging And Analysis Mounir Kamal Q-CERT 2 Applying Forensic Science to Computer Systems Like a Detective, the archaeologist searches for clues in order to discover and reconstruct
EnCase v7 Essential Training. Sherif Eldeeb https://eldeeb.net
هللامسب EnCase v7 Essential Training What s in this course Explore the most notable features of the new version. Everything you need to know about EnCase v7 to conduct basic investigations. Create Cases
Digital Forensics, ediscovery and Electronic Evidence
Digital Forensics, ediscovery and Electronic Evidence By Digital Forensics What Is It? Forensics is the use of science and technology to investigate and establish facts in a court of law. Digital forensics
SSD Guru. Installation and User Guide. Software Version 1.4
SSD Guru Installation and User Guide Software Version 1.4 Contents Welcome!............................................................................. 1 Key features.........................................................................
Ten Deadly Sins of Computer Forensics
Ten Deadly Sins of Computer Forensics Cyber criminals take advantage of the anonymity of the Internet to escape punishment. Computer Forensics has emerged as a new discipline to counter cyber crime. This
Discovery of Electronically Stored Information ECBA conference Tallinn October 2012
Discovery of Electronically Stored Information ECBA conference Tallinn October 2012 Jan Balatka, Deloitte Czech Republic, Analytic & Forensic Technology unit Agenda Introduction ediscovery investigation
Montgomery College Course Designator/Course Number: CS 110 Course Title: Computer Literacy
Montgomery College Course Designator/Course Number: CS 11 Course Title: Computer Literacy Course Length: 3 credits 3 5-minute meetings per week or equivalent Course Description: An introduction to the
It provides the performance indicators to evaluate the level of knowledge and competence of teacher to apply ICT in the educational setting.
COMMISSION ON INFORMATION AND COMMUNICATIONS TECHNOLOGY NATIONAL ICT COMPETENCY STANDARD (NICS) FOR TEACHERS INTRODUCTION The National ICT Competency Standard (NICS) for Teachers defines the competency
Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation
Computer Forensics and Digital Investigation Computer Security EDA263, lecture 14 Ulf Larson Lecture outline! Introduction to Computer Forensics! Digital investigation! Conducting a Digital Crime Scene
HIPAA Security Training Manual
HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,
Subject Area: Business Technology Education Course: 8207310 Introduction to Information Technology Computer Service and Repair 2005
Goodheart-Willcox Publisher Florida Department of Education State Standards Correlation Subject Area: Business Technology Education Course: 8207310 Introduction to Information Technology Computer Service
Computer Forensics. Securing and Analysing Digital Information
Computer Forensics Securing and Analysing Digital Information Aims What is a computer? Where is the evidence? Why is digital forensics important? Seizing evidence Encryption Hidden files and folders Live
Information Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
Impact of Digital Forensics Training on Computer Incident Response Techniques
Impact of Digital Forensics Training on Computer Incident Response Techniques Valorie J. King, PhD Collegiate Associate Professor University of Maryland University College Presentation to AFCEA June 25,
Computer Science 1301 Computer Literacy. Student Learning Outcomes
Computer Science 1301 Computer Literacy Student Learning Outcomes 1. Introduction to Computers Students will be introduced to basic computer concepts, such as what a computer is, how it works and what
Certified Digital Forensics Examiner
Cyber Security Training & Consulting Certified Digital COURSE OVERVIEW 5 Days 40 CPE Credits $3,000 Digital is the investigation and recovery of data contained in digital devices. This data is often the
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
Excerpts from EnCase Introduction to Computer Forensics
Guidance Software, Inc. 572 East Green Street #300 Pasadena, CA 91101 Tel: (626) 229-9191 Fax: (626) 229-9199 e-mail: [email protected] web: www.guidancesoftware.com Excerpts from EnCase Introduction
Chapter 13 File and Database Systems
Chapter 13 File and Database Systems Outline 13.1 Introduction 13.2 Data Hierarchy 13.3 Files 13.4 File Systems 13.4.1 Directories 13.4. Metadata 13.4. Mounting 13.5 File Organization 13.6 File Allocation
Chapter 13 File and Database Systems
Chapter 13 File and Database Systems Outline 13.1 Introduction 13.2 Data Hierarchy 13.3 Files 13.4 File Systems 13.4.1 Directories 13.4. Metadata 13.4. Mounting 13.5 File Organization 13.6 File Allocation
Chapter 4. Operating Systems and File Management
Chapter 4 Operating Systems and File Management Chapter Contents Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup
C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR
Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge
The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3
Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use
Computer Forensics Discipline
Computer Forensics Discipline Technical Procedure Manual Computer Forensics Discipline Technical Procedure Manual Approved By: Date: Reviewed By: Date: Reviewed By: Date: Table of Contents General Flow
INTERNET USE PROCEDURES Almira/Coulee Hartline Cooperative Network Acceptable Use Procedures
INTERNET USE PROCEDURES Almira/Coulee Hartline Cooperative Network Acceptable Use Procedures Purpose The purpose of the ACH Network Acceptable Use Procedures is to provide the procedures, rules, guidelines,
Chapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014
Chapter Contents Operating Systems and File Management Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup Security
Regional Computer Forensic Laboratory & Digital Forensics. Presented By: D. Justin Price FBI - Philadelphia Computer Analysis Response Team
Regional Computer Forensic Laboratory & Digital Forensics Presented By: D. Justin Price FBI - Philadelphia Computer Analysis Response Team Objectives Objectives RCFL Program Overview PHRCFL Services Forensic
File System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1
File System Forensics FAT and NTFS 1 FAT File Systems 2 File Allocation Table (FAT) File Systems Simple and common Primary file system for DOS and Windows 9x Can be used with Windows NT, 2000, and XP New
Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012
Just EnCase Presented By Larry Russell CalCPA State Technology Committee May 18, 2012 What is e-discovery Electronically Stored Information (ESI) Discover or Monitor for Fraudulent Activity Tools used
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
Digital Evidence Search Kit
Digital Evidence Search Kit K.P. Chow, C.F. Chong, K.Y. Lai, L.C.K. Hui, K. H. Pun, W.W. Tsang, H.W. Chan Center for Information Security and Cryptography Department of Computer Science The University
Network Security. Task 1 Security Measures
Task 1 Security Measures Connecting your computer to a network, particularly the Internet, can put your computer and your data at risk. It is important, therefore, that you take some steps to secure your
Digital Forensics Tutorials Acquiring an Image with FTK Imager
Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,
Computer Forensics Processing Checklist. Pueblo High-Tech Crimes Unit
Computer Forensics Processing Checklist Pueblo High-Tech Crimes Unit Cmdr. Dave Pettinari Pueblo County Sheriff's Office [email protected] The purpose of this document is to provide computer forensic technicians
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic
I Digital Forensic A newsletter for IT Professionals Education Sector Updates Issue 10 I. Background of Digital Forensic Definition of Digital Forensic Digital forensic involves the collection and analysis
1 File Management, Virus Protection, and Backup 2 File Basics Every file has a name, and might also have a filename extension You must provide a valid filename that adheres to rules or file-naming conventions
Paraben s P2C 4.1. Release Notes
Paraben s P2C 4.1 Release Notes Welcome to Paraben s P2C 4.1! Paraben's P2C is a comprehensive digital forensic analysis tool designed to handle more data, more efficiently while keeping to Paraben's P2
NORTH CAROLINA COMMUNITY COLLEGE SYSTEM H. Martin Lancaster, President
NORTH CAROLINA COMMUNITY COLLEGE SYSTEM H. Martin Lancaster, President February 7, 2008 RESPONSE DEADLINE: February 28, 2008 MEMORANDUM TO: FROM: SUBJECT: Chief Academic Officers Delores A. Parker, Vice
Introduction to Data Forensics. Jeff Flaig, Security Consultant January 15, 2014
Introduction to Data Forensics Jeff Flaig, Security Consultant January 15, 2014 WHAT IS COMPUTER FORENSICS Computer forensics is the process of methodically examining computer media (hard disks, diskettes,
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
Cloud Forensics. 175 Lakeside Ave, Room 300A Phone: 802/865-5744 Fax: 802/865-6446 http://www.lcdi.champlin.edu
Cloud Forensics Written & Researched by: Maegan Katz & Ryan Montelbano 175 Lakeside Ave, Room 300A Phone: 802/865-5744 Fax: 802/865-6446 http://www.lcdi.champlin.edu November 4, 2013 Disclaimer: This document
Information Technology Career Cluster Introduction to Digital Technology Course Number 11.41500
Information Technology Career Cluster Introduction to Digital Technology Course Number 11.41500 Course Description Introduction to Digital Technology is the foundational course for Web & Digital s, Programming,
Anchor Bay Schools Software Policy
Anchor Bay Schools Software Policy Table of Contents 1. Statement of Ethics... Page 1 2. Purchasing and Acquisition... Page 1 3. Registration... Page 1 4. Installation of Software... Page 2 5. Individual
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4
Digital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC
Digital Forensics: The aftermath of hacking attacks AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC Topics Digital Forensics: Brief introduction Case Studies Case I:
Technical Procedure for Evidence Search
Technical Procedure for Evidence Search 1.0 Purpose - The purpose of this procedure is to provide a systematic means of searching digital evidence in order to find data sought by the search authorization.
ACTIVE@ UNDELETE 7.0 USER GUIDE
ACTIVE@ UNDELETE 7.0 USER GUIDE COPYRIGHT Copyright 27, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative
Course overview. CompTIA A+ Certification (Exam 220 902) Official Study Guide (G188eng verdraft)
Overview This 5-day course is intended for those wishing to qualify with. A+ is a foundation-level certification designed for IT professionals with around 1 year's experience whose job role is focused
How To Ensure Your School Is Safe Online
Ivy Road Primary School Policy for e-safety Updated - 2014 1. Introduction Pupils interact with the internet and other communications technologies such as mobile phones on a daily basis. The exchange of
Incident Response and Forensics
Incident Response and Forensics Yiman Jiang, President and Principle Consultant Sumus Technology Ltd. James Crooks, Manager - Advisory Services PricewaterhouseCoopers LLP UBC 2007-04-12 Outline Computer
Introduction to Computers & Information Technology
130.272. Principles of Information Technology a. General requirements. This course is recommended for students in Grades 9-10. Introduction to Computers & Information Technology 1 Introduction. Students
System Security Policy Management: Advanced Audit Tasks
System Security Policy Management: Advanced Audit Tasks White Paper October 6, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that
