Investigating email crimes is the process of tracing, collecting, analyzing, and investigating digital evidence and cyber trails. Digital evidence and cyber trails can relate to email spamming, mail bombing/mail storms, email spoofing, identity fraud/chain letters, phishing attacks, and email hijacking.

Objective

The objective of this lab is to provide expert knowledge on tracking emails, investigating email crimes, and other responsibilities that include:
Tracking Emails and Investigating Email Crimes
  • Recovering deleted email messages and attachments
  • Recovering message contacts
  • Tracking sender IP address
  • Recovering and saving deleted emails
  • Tracing an email to its true geographical source
  • Collecting Network (ISP) and Domain Whois information for any email traced

Scenario

In order to investigate email crimes as a forensic investigator, you must know how to track emails and extract or recover deleted email messages from Microsoft Outlook PST files or Microsoft Outlook Express DBX files, etc., using various email tracking and investigation tools.

Tracking Emails and Investigating Email Crimes

Computer Forensics Exercises / Tracking Emails and Investigating Email Crimes contains the following Exercises:

  • Recovering Deleted Emails Using the Recover My Email Utility
  • Investigating Email Crimes Using Paraben’¬ôs Email Examiner Tool

The Virtual Private Cloud for this Lab set utilizes:


Computer Forensics Exercises are available as part of the following subscription:

CEHproductimage
Each subscription provides 6 months access to 34 Different Exercises. Each exercise contains a Scenario, Objectives, and individual step by step tasks to guide the user through all steps necessary to complete the exercise. The Computer Forensics Exercises are designed to give the user an ultimate hands-on experience. Each exercise category above has it’s own Virtual Private Cloud that comes preconfigured with Vulnerable websites, Victim Machines, and the environment is LOADED with tools, we even provide investigation files, hard disk clones and targets. Included in your network share are all the supporting tools required to practice in the Cyber Range / Lab environment.

Lab exercises are included for:

  • Computer Forensics Investigation Process
  • Computer Forensics Lab
  • Understanding Hard Disks and File Systems
  • Windows Forensics
  • Data Acquisition and Duplication
  • Recovering Deleted Files and Partitions
  • Forensics Investigation Using AccessData FTK
  • Forensics Investigation Using EnCase
  • Steganography and Image File Forensics
  • Application Password Crackers
  • Log Capturing and Event Correlation
  • Network Forensics, Investigating Logs and Investigating Network Traffic
  • Investigating Wireless Attacks
  • Tracking & Investigating Email Crimes
  • Mobile Forensics
  • Investigative Reports
Price: $199
Add to Cart
View Cart