Computer Forensics Video Tutorial Course

CareerVision Training

£ 75 - (Rs 6,398)
VAT incl.

Important information

  • Training
  • Beginner
  • Distance learning
  • Duration:
  • When:
  • Delivery of study materials

• Format: DVD-ROM
• Duration: 11 Hours (90 lessons)
• Instructor: Ric Messier
• Platform: Windows PC or Mac
• Date Released 16-01-2013

This video based Computer Forensics training course expert Ric Messier will teach you how to get started in this industry. Computer Forensics is a broad topic that touches on many different skills, all specific to answering legal or investigative questions in relation to a computer. Ric will give you an overview of the skills you will need in order to work in this highly technical field.

Because Computer Forensics is a broad field, this course covers a lot of topics, from preparing for an investigation, to ethics, to evidence acquisition, being an expert witness and legal vs. corporate investigations. You will learn about forensic tools and how they are used, such as ProDiscover, FTK, and EnCase.

Important information

Requirements: This is a DVD Video Tutorial Course which is shipped to you. Work through the video tutorials at your own pace. If you have the software you can practice along with the instructor using the same exercise files as the instructor which are included on the DVD. The narrated training videos demonstrate the key tools and professional techniques helping you to work faster and smarter. All the concepts of each application are explained clearly and precisely. The DVD works on PC and Mac. You can jump to and from lessons and work at your own pace.


Where and when

Starts Location
Distance Learning

What you'll learn on the course

Investigative Questions
Evidence Aquisition
Recovering Evidence

Course programme

01. Introduction
0101 What Is Forensics?
0102 Professions Needing Forensics
0103 What You Should Expect From This Video
0104 What You Should Know
0105 What You Will Learn
02. Legal Issues
0201 Chain Of Custody
0202 Evidence Acquisition
0203 Validating Data Under Linux
0204 Validating Data Under Windows
0205 Expert Witness
0206 Ethics For Experts
0207 Evidence Storage
0208 Rules Of Evidence
03. Investigations
0301 Differences With Legal Investigations
0302 Reasons For Corporate Investigations
0303 Preparing For An Investigation
0304 Forensic Workstation
0305 EnCase
0306 FTK
0307 Coroners Toolkit
0308 ProDiscover Basic
0309 Audit Policies
0310 Reporting
0311 UNIX Tools
0312 Sleuth Kit
0313 DEFT Linux
04. Operating Systems
0401 Windows Family
0402 Mac OS X
0403 Linux
0404 Other Types Of Operating Systems
0405 Boot Processes
0406 File Systems: Windows-Based
0407 File Systems: Linux
0408 File Systems: Mac OS
0409 File Systems: CD
0410 RAID
0411 Autostarting
0412 Executable Types And Structure: Windows
0413 Executable Types And Structure: Unix-Based
0414 Disk Partitions
05. Image Acquisition
0501 Image Formats
0502 Image Acquisitions Under Linux
0503 Image Acquisitions Under Windows
0504 Volatile Information
0505 Data Recovery
0506 Hard Drives
06. Network Acquisitions
0601 OSI Reference Model
0602 TCP/IP
0603 Network Attacks
0604 Reasons For Network Acquisitions
0605 Man In The Middle Attacks
0606 Capturing Traffic
0607 NetworkMiner
0608 Other Network Tools
0609 Wireless Networking
0610 Wireless Tools
0611 Firewalls And Their Uses
0612 Intrusion Detection Systems
07. Data Spaces
0701 Alternate Data Streams
0702 Deleted Files
0703 Hidden Partitions
0704 Slack Space And Swap File
0705 Registry
0706 Virtual Memory
0707 System Recovery Checkpoints: Windows
0708 Audit Logs And Settings
08. Data Recovery
0801 Graphics Files
0802 E-Mail
0803 Internet: Cache, Cookies, Etc.
0804 Metadata
0805 Log Files
0806 Steganography
0807 Steganography Techniques: Images And Video
0808 Steganography Techniques: Audio And Documents
0809 Steganalysis
0810 Compression
09. Virtual Machines
0901 Virtual Machines
0902 Checkpoints
0903 Data Formats
0904 Hypervisors
10. Mobile Forensics
1001 IOS
1002 Android
1003 Symbian OS
1004 Tools
1005 Memory Considerations
1006 SIM Cards
11. Malware Forensics
1101 Malware Forensics
1102 Static Malware Analysis
1103 Dynamic Malware Analysis
12. About Me
1201 About Me