Back

System Forensics, Investigation, and Response

Only demo functionality is available. Module 2 is active for you to review. If you would like further review access to any of the Jones & Bartlett courses please contact your Account Representative.

Table of Contents

  1. Course Introduction
    Study Guide
    Using the Lab Manual
    Working with Virtual Labs
    Project Description
    Introduce Yourself
  2. Reading Assignment
    -eBook: Chapter 3 Forensic Methods and Labs
    -eBook: Chapter 14 Trends and Future Directions
    -eBook: Chapter 15 System Forensics Resources
    Lecture Presentation: Forensic Methods and Labs
    Lecture Presentation: Trends and Future Directions
    Lecture Presentation: System Forensics Resources
    Discussion: Certifications
    Assignment: Digital Forensic Software or Equipment Proposal
    Assignment: The Cloud
    Assignment: Digital Forensic Conferences
    Virtual Lab: Documenting a Workstation Configuration Using Common Forensic Tools
    Assessment Worksheet for the Virtual Lab
  3. Reading Assignment
    -eBook: Chapter 4 Collecting, Seizing, and Protecting Evidence
    Lecture Presentation: Collecting, Seizing, and Protecting Evidence
    Assignment: Chain of Custody Roles and Requirements
    Assignment: Best Practices in Collecting Digital Evidence
    Assignment: Proper Methods for Recovering Data
    Virtual Lab: Uncovering New Digital Evidence Using Bootable Forensic Utilities
    Assessment Worksheet for the Virtual Lab
  4. Reading Assignment
    -eBook: Chapter 5 Understanding Techniques for Hiding and Scrambling Information
    -eBook: Chapter 6 Recovering Data
    Lecture Presentation: Understanding Techniques for Hiding and Scrambling Information
    Lecture Presentation: Recovering Data
    Discussion: Steganography and Its Implications for Security
    Assignment: Steganography Detection Tools
    Assignment: Data Recovery Plan
    Virtual Lab: Creating a Forensic System Case File for Analyzing Forensic Evidence
    Assessment Worksheet for the Virtual Lab
  5. Reading Assignment
    -eBook: Chapter 7 E-mail Forensics
    Lecture Presentation: E-mail Forensics
    Discussion: E-mail and the Law
    Assignment: E-Mail Presentation
    Virtual Lab: Analyzing Images to Identify Suspicious or Modified Files
    Assessment Worksheet for the Virtual Lab
    Project Part 1: Preparing for a Forensic Investigation
  6. Reading Assignment
    -eBook: Chapter 8 Windows Forensics
    Lecture Presentation: Windows Forensics
    Assignment: Tools for Monitoring Changes to Files and Memory
    Assignment: Windows Forensics
    Virtual Lab: Recognizing the Use of Steganography in Image Files
    Assessment Worksheet for the Virtual Lab
  7. Reading Assignment
    -eBook: Chapter 9 Linux Forensics
    Lecture Presentation: Linux Forensics
    Discussion: Comparing Windows and Linux Forensic Investigations
    Assignment: Linux Forensics
    Virtual Lab: Automating E-mail Evidence Discovery Using P2 Commander
    Assessment Worksheet for the Virtual Lab
    Project Part 2: Analyzing an E-mail Archive for an Electronic Discovery Investigation
  8. Reading Assignment
    -eBook: Chapter 10 Macintosh Forensics
    -eBook: Chapter 11 Mobile Forensics
    Lecture Presentation: Macintosh Forensics
    Lecture Presentation: Mobile Forensics
    Discussion: Comparing Windows and Macintosh Forensic Investigations
    Discussion: The Issue of Monitoring
    Assignment: Macintosh Forensics
    Assignment: Mobile Forensics
    Assignment: Data Doctor
    Assignment: Appropriate Traffic Analysis Tools
    Virtual Lab: Decoding an FTP Protocol Session for Forensic Evidence
    Assessment Worksheet for the Virtual Lab
  9. Reading Assignment
    -eBook: Chapter 12 Performing Network Analysis
    Lecture Presentation: Performing Network Analysis
    Assignment: Network Traffic Analysis Tool Evaluation
    Virtual Lab: Identifying and Documenting Evidence from a Forensic Investigation
    Assessment Worksheet for the Virtual Lab
  10. Reading Assignment
    -eBook: Chapter 13 Incident and Intrusion Response
    Lecture Presentation: Incident and Intrusion Response
    Discussion: Adding Forensics to Incident Response
    Assignment: Network Security Breaches
    Virtual Lab: Conducting an Incident Response Investigation for a Suspicious Login
    Assessment Worksheet for the Virtual Lab
  11. Final Project Submission Assignment
    Final Exam


Copyright © 2016 Jones & Bartlett Learning. All rights reserved