Visão Geral
O curso Digital Forensics fornece uma introdução básica sólida à Digital Forensics em sistemas baseados em Microsoft Windows. Você trabalha em um ambiente Windows e Linux para suas estações de trabalho investigativas e é exposto a habilidades teóricas e práticas para um examinador forense de nível básico (aquisição, análise e relatórios), com exposição a tópicos avançados (sistema ao vivo e análise forense móvel).
Conteúdo Programatico
Defining digital forensics
- Articulating the importance of Locard's Principle
- Contextualizing digital forensics within incident response
Explaining the role of digital forensics in investigations
- Criminal, civil and intelligence/anti-terrorism investigations
- Applying the scientific method to investigations
Articulating the role of a digital forensic examiner
- Maintaining objectivity within investigations
- Ensuring confidentiality and integrity
Exploring legal considerations of digital forensics
- Respecting privacy rights and expectations
- Addressing and reporting illegal information
Defining and applying privacy principles
- Outlining the twelve privacy principles
- Addressing the duty to preserve in eDiscovery
Examining the core operational principles of a computer
- Inspecting hard drive storage and architecture
- Reviewing the operations of computer memory
Identifying multiple locations of digital evidence within a computer system
- Investigating alternate data streams
- Uncovering hidden data with Steganography
Determining lab requirements
- Key components of a digital forensics lab
- Conducting tool validation
Preparing and configuring a forensic workstation
- Demonstrating appropriate use of a hardware write-blocker
- Exploring key features of commercial and open source forensic software (e.g., EnCase, FTK, DD)
Image acquisition
- Creating bit-for-bit copies of digital evidence
- Mounting and searching images
Documenting the physical and digital crime scene
- Conducting crime scene photography
- Executing triage techniques and methodologies
Managing the chain of custody
- Bagging and tagging physical evidence
- Documenting and demonstrating evidence continuity
Identifying key Windows artifacts
- Recovering and searching the Windows registry
- Hibernation files, event logs, prefetch, shellbag and lnk files
- Password hash extraction and cracking
Performing keyword searching, bookmarking and timeline analysis
- Developing strategies for effective keyword searching
- Reconstructing the order of events with timeline analysis
Conducting e-mail, web browser and USB investigations
- Extracting and recovering deleted data from slack space
- Tracking user activity and addressing Trojan Defense
- Performing Mobile Forensics
Safely handling mobile devices during investigations
- Examining the use of Faraday bags
- Demonstrating the use of mobile cables and write-blockers
Preserving and acquiring evidence from mobile devices
- Investigating evidence located within the address book, calendar, mail, apps and SMS
- Recovering data from SIM cards
Performing live memory acquisitions
- Demonstrating the investigative value of live memory analysis on running systems
- Utilizing open-source tools to capture and extract live memory
Analyzing memory dumps for investigative information
- Determining running processes, active network connections and recent commands
- Identifying hidden processes and Malware