0% found this document useful (0 votes)
9 views2 pages

Cell Phone and Mobile Devices

The document discusses topics related to computer forensics including the investigative process, forensic tools, analyzing different operating systems and devices, anti-forensics techniques, network and mobile forensics, and legal issues.

Uploaded by

Rehmah Atugonza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views2 pages

Cell Phone and Mobile Devices

The document discusses topics related to computer forensics including the investigative process, forensic tools, analyzing different operating systems and devices, anti-forensics techniques, network and mobile forensics, and legal issues.

Uploaded by

Rehmah Atugonza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Computer Forensics

Introduction to Computer Forensics: Computer Crimes, Investigative Process, Forensic 6


tools, Guidelines and procedures, evidence extraction and preservation, Crime and incident
scenes, chain of custody,
Understanding hardware and operating systems: Structure of storage media/devices, File 6
Systems and Hard Disks, Digital Media Devices, Boot Processes, MPR, Partitions.
Understanding Computer Forensic tools: Forensic Workstations, Hardware and software 3
Tools: Encase, Helix, FTK, Autopsy, Sleuth kit, ToolKit, WinHex,
Windows, Linux and Macintosh Forensics: Windows Evidence artifacts, Registry, Event 6
Viewer, Task Manager, System and Activity Logs, Image acquisition, live system Analysis,
Disk Imaging, Malware Analysis, Cache files. Memory Forensics.
Anti-Forensics and Data recovery: File carving, slack space, identifying hidden data, 9
Encryption/Decryption, Steganography, recovering deleted files, identifying forged images,
Files signature analysis, hashing.
Network Forensics: Monitoring and Intrusion detection, Scanners and sniffers, collecting 6
and analyzing network-based evidence, Web and e-mail activity, Server logs
Mobile Forensics: Analyzing data found on Cell Phone and Mobile Devices 3
Computer forensics and Legal issues: Search warrant and seizure, Data privacy and 3
protection issues.
Writing Forensic Reports: Expert Testimony, reporting. 3

References
Sammons, J., 2015. The basics of digital forensics: the primer for getting started in digital
forensics. Elsevier.

Ligh, M.H., Case, A., Levy, J. and Walters, A., 2014. The art of memory forensics: detecting
malware and threats in windows, linux, and Mac memory. John Wiley & Sons.

Nelson, B., Phillips, A. and Steuart, C., 2014. Guide to computer forensics and investigations.
Cengage Learning.
Press, E.C., 2010. Computer Forensics: Investigating Hard Disks, Files and Operating Systems.
Course Technology Cengage learning, USA.

You might also like