Digital Forensics: This course provides a comprehensive overview of digital forensics with a slight focus on the Unix operating environment and examples from many other sorts of systems. It includes:
Properties of the evidence What is computer forensics all about How do people use and abuse computer systems What kind of evidence What does it look like What does it tell us Where and how do we get it When can we get it When does it go away How do we interpret it How do we validate it What are the limits How long does it last How valid is it Admissibility Accuracy Timeliness Chain of custody issues Resources for Cyber Cops Presenting the evidence
Audio recordings with details you can't find anywhere else - AND - lots of examples from real cases.
Samples of the sorts of data you will find in real systems is provided for your analysis. This includes: Mac, DOS, Windows, Unix, Radius logs, Web access logs, system audit trails, and other data samples that provide a rich environment for understanding the issues of digital forensic analysis. Practice makes perfect...
More than 50 color photographs of different types of hardware, facilities, and collections of things yoou might find at a crime scene, complete with detailed descriptions of what's there and challenges you might encounter in dealing with it. Wint to see a fibre hub and find out how to handle it? How about a bundle of wires going under the raised floor? A big row of computers networked together? An ATM switch? A PBX or two? It's better to know what you might encounter before encountering it on site.
This is the a unique course and it is a great deal for anybody engaged in digital forensics. It is updated regularly to reflect changes in our field, and you can only get it here!