EnCase® Forensic solution lets examiners acquire data from a wide variety of devices, unearth potential evidence with disk level forensic analysis, and craft comprehensive reports on their findings, all while maintaining the integrity of their evidence.
Objective
Scenario
Ace-1 Company called for a board meeting to discuss the issue. Additionally, an investigator was hired by the company to look for any fraudulent trading. Upon investigation, they discovered a suspicious email implicating that Daniel (a member of the management team) copied the business strategy blueprint to his pen drive and sent it to the rival company using his personal email id from his laptop.
Forensics Investigation Using EnCase
Computer Forensics Exercises / Forensics Investigation Using EnCase contains the following Exercises:
- Forensics Investigation Using EnCase
The Virtual Private Cloud for this Lab set utilizes:
Incident Handling Exercises are available as part of the following subscription:
Lab exercises are included for:
- Trojans and Backdoors
- Computer Forensics Investigation Process
- Understanding Hard Disks and File Systems
- Forensics Investigation Using AccessData FTK
- Forensics Investigation Using EnCase
- Log Capturing and Event Correlation