This course teaches fundamental data collection and analysis techniques used in digital forensic investigations.
Business computers and the data they contain are targets of an increasing number of attacks, which has brought electronic evidence and information gathering to the forefront of incident response. This web-based course is designed for the IT professional who needs to understand the latest techniques and strategies for forensic evidence collection. In three lessons, you will learn tips for controlling a digital forensic investigation and techniques for seizing, collecting, and protecting evidence. The course offers access to online resources including texts, case studies, lectures, and virtual labs that duplicate real-world scenarios. Qualified instructors are available to answer questions about the content and theory.
In the labs for this course, you will work in a virtual environment with a wide range of forensic tools. First, you will run WinAudit, DevManView, and Frhed on sample files to determine if any clandestine threats and vulnerabilities, such as viruses and malicious software, are present. Then you will use Helix, a bootable utility, to identify system state and potential evidence on a running system. You will also run a series forensic tools to extract data from the Internet Explorer browser. These tools include Process Explorer, FavoritesView, IECacheView, IECookiesView, BrowsingHistoryView, and MyLastSearch. Finally, you will use S-Tools, one of many free tools available online, and the Windows Photo Viewer to discover possible steganographic activity on the image files of an evidence drive copy.
Learning Objectives
- Identify the role of computer forensics in responding to crimes and solving business challenges.
- Procure evidence in virtualized environments.
- Examine steganography and encryption techniques for hiding and scrambling information.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Digital Forensics
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.