This bundle includes the following courses

  • 01

    DIGITAL FORENSICS CONCEPTS

    • What is Digital Forensics

    • Digital Forensics Investigation

    • What is the Digital Evidence

    • Digital Devices

    • Legal Aspects

    • Types of Digital Forensic Investigation

    • Challenges of Digital Forensics

    • Conclusion

    • How to set up your Windows VM - VMware

    • How to set up your Windows VM - VBox

    • Check Your Module's Knowledge

    • References

    • Have a Question?!

  • 02

    WORKING WITH VIRTUAL HARD DISK

    • Hard Disk - Physical & Logical Drive

    • Virtual Hard Disk (VHD)

    • Creating Virtual Hard Disk

    • Creating Virtual Hard Disk with Two Partitions

    • Required Files -- Attaching and Detaching Virtual Hard Disk

    • Attaching and Detaching Virtual Hard Disk

    • Exercise #1

    • Solutions_Virtual_Hard_Disk

    • Summary

    • Check Your Module's Knowledge

    • Have a Question?!

  • 03

    EVIDENCE ACQUISITION UNDER WINDOWS

    • Data Acquisition Concepts

    • Data Validation

    • Acquisition Methods

    • Forensic Image File formats

    • The Importance of Evidence Acquisition

    • Must-Know First Response actions

    • Required Files -- Sanitization of the Target Media

    • Sanitization of the Target Media

    • Hardwipe Tool

    • Cygwin tools (dd command in Windows)

    • Check Your Knowledge

    • Exercise #1

    • Exercise #1 Solution

    • Required Files -- Acquisition Tools

    • Evidence Data Acquisition

    • Memory Dump

    • Tools for Memory Dump

    • Disk Drive Imaging

    • Other Forensic Tools

    • Exercise #2

    • Solution_Exercise#2

    • Examples of Hardware Acquisition Tools

    • Using UltraDock Write-Blocker

    • Required Files - Mounting a Forensic Image

    • Introduction to Image Mounting

    • Arsenal Image Mounter

    • OSFMount

    • Other Forensic Image Mounting Tools

    • Exercise#3

    • Solution_Exercise#3

    • Summary

    • References

    • Have a Question?!

  • 04

    WORKING WITH FTK IMAGER

    • Introduction to Forensic Toolkit Imager

    • Required Files -- Introduction

    • Required Files -- Installation of FTK Imager

    • Install FTK Locally

    • Install FTK on a Portable Device (USB)

    • Required Files -- Evidence Acquisition

    • Digital Evidence Acquisition

    • Memory Acquisition

    • Disk Acquisition

    • Exercise #1

    • Solutions Exercise #1

    • Required Files -- Attach an Evidence Item

    • Add Evidence Item to FTK Imager

    • Create and Verify a Multi-Part Disk Images

    • Loading a Multi-Part Disk Image

    • Required Files -- Evidence Analysis

    • Evidence Analysis

    • Exporting Data using FTK Imager

    • Detect EFS Encryption

    • Exercise #2

    • Solution Exercise #2

    • Acquiring Protected Registry Files

    • Copying Registry Files

    • Required Files -- Interpreter in FTK

    • Interpreter

    • Exercise #3

    • Solution Exercise #3

    • Required Files -- Create Images with Advanced Features

    • Custom Content Images

    • AD Encryption

    • Exercise #4

    • Solution Exercise #4

    • Required Files -- Image Mounting

    • Image Mounting

    • Steps of Image Mounting

    • Mount Multi-Part Raw Disk Image with FTK

    • Summary

    • Have a Question?!

  • 05

    COMPUTER DATA REPRESENTATION

    • Introduction to Data Representation

    • Numbering Systems

    • Decimal Number System (Base 10)

    • Binary System (Base 2)

    • Hexadecimal (Base 16)

    • Octal (Base 8)

    • Byte Ordering

    • Introduction to Text Code

    • ASCII Code

    • Unicode

    • Exercises

    • Solutions

    • Have a Question?!

  • 06

    WORKING WITH FILES

    • Introduction to File Identification

    • Installation of HxD Editor

    • Working with HxD Editor

    • Installation of 010 Editor

    • Working with 010 Editor

    • 010 Editor, Let us start

    • Explore the View Options

    • Viewing Unicode Files

    • View Options: Edit As

    • View: Font & Character Set

    • View: Line Width & Addresses

    • View: Group by, Division Lines, Left & Right View Areas

    • View: Highlighting, Ruler, & Status Bar

    • More View Options

    • File Offsets

    • Relative Offsets

    • Examples on Relative Offsets 1

    • Examples on Relative Offsets #2

    • Search Menu: Find using Hex

    • Search Menu: Find using Text

    • Search Menu: Replace

    • Search Menu: Find Strings

    • Search Menu: Find in Files

    • Search Menu: Replace in Files

    • Search Menu: Goto...

    • Search Menu: Goto using Directions

    • The Format Menu

    • Tools Menu Part #1

    • Tools Menu Part #2

    • Inspector (Interpreting Data) Part #1

    • Inspector (Interpreting Data) Part #2

    • Templates Part #1

    • Templates (File Signatures) Part #2

    • Templates - PE File (Part #1)

    • Templates - PE File (Part #2)

    • Templates - PE File (Part #3)

    • Templates - PE File (Part #4)

    • Templates - PE File (Part #5)

    • Templates - PE File (Part #6)

    • Templates - PE File (Part #7)

    • Templates - PE File (Part #8)

    • Templates - PE File (Part #9)

    • Templates - PE File (Part #10)

    • Templates - PE File (Part #11)

    • Templates - PE File (Part #12)

    • Reviewing 010 Template for PE File Format

    • Introduction to File Signature

    • Text Files

    • Microsoft Word File

    • TAR Files

    • Zip File

    • PNG Files

    • EXE Files

    • MP3 Files

    • MP4 Files

    • System Metadata

    • Embedded Metadata

    • Required Files -- Exercises

    • Exercise #1

    • Exercise #2

    • Exercise #3

    • Solutions of Exercises

    • Have a Question?!

  • 07

    FILE SYSTEM AND DATA CARVING

    • Introduction to File System and Data Carving

    • What is File System

    • Hard Disk

    • NTFS

    • Ext4

    • NTFS vs EXT4

    • Required Files -- Data Carving

    • Introduction to Data Carving

    • Manual Data Carving - Using Hex Editor

    • Manual Data Carving - Carving an Image from a Doc File

    • Automatic Data Carving - Photorec

    • Automatic Data Carving - foremost

    • Required Files -- Exercises

    • Exercise #1

    • Exercise #1 - Solution

    • Exercise #2

    • Exercise #2 - Solution

    • Exercise #3

    • Exercise #3 - Solution

    • Have a Question?!

  • 08

    WORKING WITH TIME ZONES AND DATES

    • Introduction

    • Converting Times

    • Converting Dates

    • Exercise 01

    • Exercise 01 - Solution

    • File Operations

    • Required Files -- Timestamps and File Operation

    • Exercise 02 -- Inspecting Timestamps

    • Exercise 02 -- Solutions

    • Have a Question?!

  • 09

    WRITING FORENSIC REPORTS

    • What is the Forensics Report ?

    • Preparing For Forensics Report

    • The Importance of the Forensics Report

    • Why Documenting is Important?

    • Forensics Report Sections

    • Reporting Standards And Guidelines

    • Conclusions

    • Have a Question?!

Learning Outcomes

After completing this course, you will learn the following.

  • Understand the concepts of digital forensics and investigation

  • Understand the evidence acquisition and how to acquire evidence under Windows

  • Master FTK Imager usage

  • Learn how data is represented on computers

  • Understand files and headers

  • Become familiar with the basics of file systems and learn how to carve data

  • Master time zones and date analysis

  • Learn how to write forensic reports

Technical Requirements

To complete the hands-on labs of this track

  • Basic knowledge of using a Virtual Machine

  • Windows 10 operating system (recommended)

What is next at Cyber 5W?

Add your email to receive updates on new courses.