What Are the Different Types of Computer Forensics Courses?
Computer forensics technology refers to the process of using computer science and related scientific and technological principles and methods to obtain evidence related to computer systems to prove the existence of an objective fact. Computer evidence refers to all materials and their derivatives that exist in computer form and are used as evidence. [1]
Computer forensics
- The development of computer forensics technology has been less than 20 years, of which the development of forensics technology in the United States is the most representative. The definition of computer forensics was first proposed by the International Association of Computer Specialists (IACIS) at the International Conference of Computer Experts in the United States in 1991. Computer forensics, also known as digital forensics and electronic forensics, refers to how forensics personnel can identify legal, reliable, and credible electronic evidence that exists in computers, related peripherals, and networks in a manner consistent with legal norms, The process of obtaining, transmitting, storing, analyzing, and submitting digital evidence. Digital evidence generally refers to key documents, pictures, and emails, and sometimes upon request, reproduces details of a computer's past work, such as
- Chapter 1 Introduction to Computer Forensics
- 1.1 Basic Concepts of Computer Forensics
- 1.2 Computer Forensics History and Development
- 1.3 Computer Forensics-Interdisciplinary
- 1.4 Computer Forensics Model and Process
- 1.5 Problems and Trends in Computer Forensics
- Exercise one
- Chapter 2 Computer Forensics Basics
- 2.1 Storage media
- 2.2 File system
- 2.3 Data encryption
- 2.4 Data hiding
- 2.5 Data Recovery
- 2.6 Intrusion and Intrusion Detection Information Sources
- 2.7 summary
- Exercise two
- Chapter 3 Legal Issues in Computer Forensics
- 3.1 legal basis
- 3.2 Electronic data and computer evidence
- 3.3 Computer Forensics Practice
- 3.4 Computer Forensics and Electronic Data Identification
- 3.5 Electronic data appraisal report, forensic appraisal report
- 3.6 Summary
- Exercise three
- Chapter 4 Computer Forensics
- 4.1 Computer Forensics Preparation
- 4.2 Evaluation of field evidence
- 4.3 Collection and preservation of computer evidence
- 4.4 Extraction of computer evidence
- 4.5 Inspection, Analysis and Reasoning of Computer Evidence
- 4.6 Organize documents and reports
- 4.7 Disk imaging tool
- 4.8 summary
- Exercise four
- Chapter 5 Windows System Forensics
- 5.1 Obtaining on-site evidence of Windows system
- 5.2 Obtaining Computer Evidence in Windows
- 5.3 Simple forensic analysis
- 5.4 Anti-Forensics Technology of Windows System
- 5.5 Windows Forensics Tools
- 5.6 Summary
- Exercise five
- Chapter 6 Linux System Forensics
- 6.1 Obtaining on-site evidence of LINUX system
- 6.2 Computer evidence acquisition in LINUX system
- 6.3 Simple Forensic Analysis Reasoning
- 6.4 Forensic Tools in Linux
- 6.5 Summary
- Exercise six
- Chapter 7 Computer Forensics in a Network Environment
- 7.1 Overview
- 7.2 WWW browsing activity
- 7.3 Email communication
- 7.4 Instant messaging
- 7.5 Peer-to-Peer Network Application
- 7.6 Network real-time communication forensics
- 7.7 Summary
- Exercise seven
- Chapter 8 Computer Forensics Cases
- 8.1 Case 1 The website of an institution was hacked
- 8.2 Case 2: Improper Use of Email
- 8.3 Case 3 Internal IT Staff Dismissal
- 8.4 Case 4 Theft of Virtual Property-Game "Gold Coins"
- 8.5 Case 5 Financial computer cyber crime
- Chapter 9 Computer Forensics Course Experiment
- 9.1 Field of Experiments Collecting Volatile Data
- 9.2 Experiment 2 Disk Data Image Backup
- 9.3 Experiment 3 Recover Deleted Data
- 9.4 Lab 4 Perform Network Monitoring and Communication Analysis
- 9.5 Experiment 5 Analyze hidden files and cache information in Windows
- 9.6 Experiment 6 Evidence Collection and Analysis on UNIX System
- 9.7 Experiment 7 Data Decryption
- 9.8 Collecting and Analyzing Evidence with Comprehensive Forensic Tools in Experiment 8
- Internet resources
- references
- ...