What Are the Different Types of Computer Forensics Courses?

Computer forensics technology refers to the process of using computer science and related scientific and technological principles and methods to obtain evidence related to computer systems to prove the existence of an objective fact. Computer evidence refers to all materials and their derivatives that exist in computer form and are used as evidence. [1]

Computer forensics

The development of computer forensics technology has been less than 20 years, of which the development of forensics technology in the United States is the most representative. The definition of computer forensics was first proposed by the International Association of Computer Specialists (IACIS) at the International Conference of Computer Experts in the United States in 1991. Computer forensics, also known as digital forensics and electronic forensics, refers to how forensics personnel can identify legal, reliable, and credible electronic evidence that exists in computers, related peripherals, and networks in a manner consistent with legal norms, The process of obtaining, transmitting, storing, analyzing, and submitting digital evidence. Digital evidence generally refers to key documents, pictures, and emails, and sometimes upon request, reproduces details of a computer's past work, such as
Chapter 1 Introduction to Computer Forensics
1.1 Basic Concepts of Computer Forensics
1.2 Computer Forensics History and Development
1.3 Computer Forensics-Interdisciplinary
1.4 Computer Forensics Model and Process
1.5 Problems and Trends in Computer Forensics
Exercise one
Chapter 2 Computer Forensics Basics
2.1 Storage media
2.2 File system
2.3 Data encryption
2.4 Data hiding
2.5 Data Recovery
2.6 Intrusion and Intrusion Detection Information Sources
2.7 summary
Exercise two
Chapter 3 Legal Issues in Computer Forensics
3.1 legal basis
3.2 Electronic data and computer evidence
3.3 Computer Forensics Practice
3.4 Computer Forensics and Electronic Data Identification
3.5 Electronic data appraisal report, forensic appraisal report
3.6 Summary
Exercise three
Chapter 4 Computer Forensics
4.1 Computer Forensics Preparation
4.2 Evaluation of field evidence
4.3 Collection and preservation of computer evidence
4.4 Extraction of computer evidence
4.5 Inspection, Analysis and Reasoning of Computer Evidence
4.6 Organize documents and reports
4.7 Disk imaging tool
4.8 summary
Exercise four
Chapter 5 Windows System Forensics
5.1 Obtaining on-site evidence of Windows system
5.2 Obtaining Computer Evidence in Windows
5.3 Simple forensic analysis
5.4 Anti-Forensics Technology of Windows System
5.5 Windows Forensics Tools
5.6 Summary
Exercise five
Chapter 6 Linux System Forensics
6.1 Obtaining on-site evidence of LINUX system
6.2 Computer evidence acquisition in LINUX system
6.3 Simple Forensic Analysis Reasoning
6.4 Forensic Tools in Linux
6.5 Summary
Exercise six
Chapter 7 Computer Forensics in a Network Environment
7.1 Overview
7.2 WWW browsing activity
7.3 Email communication
7.4 Instant messaging
7.5 Peer-to-Peer Network Application
7.6 Network real-time communication forensics
7.7 Summary
Exercise seven
Chapter 8 Computer Forensics Cases
8.1 Case 1 The website of an institution was hacked
8.2 Case 2: Improper Use of Email
8.3 Case 3 Internal IT Staff Dismissal
8.4 Case 4 Theft of Virtual Property-Game "Gold Coins"
8.5 Case 5 Financial computer cyber crime
Chapter 9 Computer Forensics Course Experiment
9.1 Field of Experiments Collecting Volatile Data
9.2 Experiment 2 Disk Data Image Backup
9.3 Experiment 3 Recover Deleted Data
9.4 Lab 4 Perform Network Monitoring and Communication Analysis
9.5 Experiment 5 Analyze hidden files and cache information in Windows
9.6 Experiment 6 Evidence Collection and Analysis on UNIX System
9.7 Experiment 7 Data Decryption
9.8 Collecting and Analyzing Evidence with Comprehensive Forensic Tools in Experiment 8
Internet resources
references
...

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?