Overview of Digital Forensics Professions and Investigations
- 10:00 AM – 01:00 PM
- Fundamentals of Digital Forensics, History
- Overview of NIST 800-86
- Preparation for Digital Investigation
- Maintaining Professional Conducts
- Process for Investigation for Private High-Tech Organization
- Establishing Investigation Office/Laboratory with Software and Workstation
- 02:00 PM – 04:00 PM
- ProDiscover, Access Toolkit Installation, and Configurations
- Use cases investigations using tools
Overview of Processing of Crime and Incident Scenes with Data Acquisition for Forensics Investigations
- 10:00 AM – 01:00 PM
- Identifying & Collecting Digital Evidence
- Processing Law Enforcement Crime Scene
- Seizing the Digital Evidence on Crime Scene
- Storing Digital Evidence
- Understanding the Digital Storage Formats
- Determine the Best Acquisition Method
- Contingency Planning for Image Acquisition
- Validating Data Acquisition using Digital HASH
- 02:00 PM – 04:00 PM
- Acquiring the Digital Images of Devices using Acquisition Tools
- Verification of Acquired Images through Multiple Tools
Overview of Windows System Artifacts for Investigation
- 10:00 AM – 01:00 PM
- Understanding the File System
- Exploring the Microsoft File Structures
- Examining of NTFS Disks
- Understanding of Whole Disk Encryption
- Understanding and Examine of Registry
- Understanding and Examine Events/Logs
- Virtual Machine Architecture
- 02:00 PM – 04:00 PM
- Examination of Operating System File Structures
- NTFS unallocated cluster Identifications for data recovery
Overview of Multimedia Files & Mobile Forensics
- 10:00 AM – 01:00 PM
- Understanding Multimedia Files Formats
- Understanding Data Compression
- Identifying unknown Files Format
- Understanding Mobile Device Forensics
- Acquisition Procedures for Mobile Devices
- Acquisition and Analysis of Mobile Applications Artifacts
- 02:00 PM – 04:00 PM
- Processing Evidence Containing Graphics Images
- Locating Graphics in Unreadable Partitions
- Look for suspicious files
- Examine files that have bad extensions
- Identify JPEG header signatures
Overview of Network and Social Media Forensics
- 10:00 AM – 01:00 PM
- Performing Live Acquisitions
- Overview of Network Forensics
- Packet Capture and Analysis
- SSL/TLS Traffic Analysis
- Firewall and Applications Logs
- Applying Digital Forensics Methods to Social Media Applications
- Creating User Profiles
- 02:00 PM – 04:00 PM
- Analysis of Wireshark PCAPs files
- Extract the Twitter data against users, events, and incidents and used it for analysis
- Extract the geolocation information of users/groups' posts data for analysis
- Extract the Facebook page's various types of data i.e. comments, posts, and likes for analysis