Computer Forensics Exercises

/Computer Forensics Exercises

Recovering Deleted Files and Deleted Partitions

File and partition recovery allows you to recover critically important documents and other files that have been lost by accidental deletion, intentional deletion to conceal the evidence, a system crash due to a virus, a software malfunction, or even sabotage. Forensic recovery of deleted files and partitions is achieved by using recovery tools that identify [...]

August 7th, 2014|Categories: Computer Forensics Exercises|Comments Off on Recovering Deleted Files and Deleted Partitions

Data Acquisition and Duplication

Data acquisition is the process of gathering evidence or information. This can be done by using established methods to acquire data from a suspected storage media outlet to gain access to information about the crime or other incident, and potentially using that data as evidence to convict a suspect. Investigating [...]

August 7th, 2014|Categories: Computer Forensics Exercises|Comments Off on Data Acquisition and Duplication

Understanding Hard Disks and File Systems

While investigating a computer-based crime, it is important to understand hard disks and filesystems, as these are the major sources of data storage. People usually delete their tracks after committing a crime with a computer in order to avoid being traced. That is why recovering the deleted files of hard disks and analyzing filesystems is [...]

August 7th, 2014|Categories: Computer Forensics Exercises, Understanding Hard Disks and File Systems|Comments Off on Understanding Hard Disks and File Systems

Computer Forensics Lab

A Computer Forensics Lab (CFL) is a designated location for conducting computer-based investigations on collected evidence. It is an efficient computer forensics platform that is able to investigate any cybercrime event. In a CFL, the investigator analyzes media, audio, intrusions, and any type of cybercrime evidence obtained from the crime scene. [...]

August 7th, 2014|Categories: Computer Forensics Exercises, Computer Forensics Lab|Comments Off on Computer Forensics Lab

Computer Forensics Investigation Process

The computer forensics investigation process is a methodological approach of preparing for an investigation, collecting and analyzing digital evidence, and managing the case from the reporting of the crime until the case'™s conclusion. Recovering deleted files from hard disk Viewing disk raw sectors Using encrypting commands Generating hashes and checksum [...]

August 7th, 2014|Categories: Computer Forensics Exercises, Computer Forensics Investigation Process|Comments Off on Computer Forensics Investigation Process

Computer Forensics Exercises

Computer Forensics Exercises are available as part of the following subscription: Each subscription provides 6 months of access to 34 Different Exercises. Each exercise contains a Scenario, Objectives, and individual step by step tasks to guide the user through all steps necessary to complete the exercise. The Computer Forensics Exercises are designed to give the [...]

July 29th, 2014|Categories: Computer Forensics Exercises|Comments Off on Computer Forensics Exercises