CET4861 Lectures Page
Lectures that are useful for the materials in this course will be posted on this page. In addition to lectures produced for this class, this page also includes lectures from other courses.
I strongly suggest you download these files to your computer, that way you can view the video on your host system and have access to it at any time (even when you are offline). Also, run the video in your host system (Windows, whatever) and have your VM open while I work through the video. Pause the video when I run the command, duplicate the command. Does it work? Great! You're doing it correctly. Doesn't work? You're doing it wrong! That's the only way to learn Linux, by DOING! Now have fun!
|
Topics
|
|
Link |
Introduction |
|
1 |
Introduction & expectations that apply to all of my courses. Once you've had one course with me you'll know what I expect in every other course, but make sure you view this first!
Length: 22 Minutes
|
|
Introduction to Dr. Craiger's courses
|
|
2 |
Syllabus contents and class details to CET4861. These are the gritty details of the course. Please make sure to read the syllabus thoroughly and follow along with this lecture.
Length: 11 Minutes
|
|
Introduction to CET4861
|
4860 Review (Dr. Craiger's way) |
|
Videos for review only |
|
1 |
Introduction to forensics, basic forensics procedures, and dealing with evidence
Length: 28 Minutes
|
|
Forensic process
|
|
2 |
Steps to create a disk image, verify a disk image, and document the process.
Length: 8 Minutes
|
|
Imaging
|
|
3 |
One-way cryptographic hashing. Verify files with MD5 cryptographic hashes on Linux and windows. Analyze a disk image safely in read-only mode.
Length: 21 Minutes
|
|
Verification |
|
4 |
A look at the details of the Virtual File Allocation Table File System (VFAT)
Length: 30 Minutes
|
|
VFAT file system |
|
Sample of Tools for Forensic Examination |
|
1 |
Brief overview of FTK Imager such as adding a drive, creating a hash of a drive, and creating a disk image.
Length: 19 Minutes
|
|
FTK Imager |
|
2 |
Creating an image and file hashes using ProDiscover
Length: 17 Minutes
|
|
ProDiscover |
|
3 |
How to image and verify a drive using Linux. Use dd to image a drive in Linux, obtain file information with file, and multiple methods to create and view hashes.
Length: 20 Minutes
|
|
Linux dd |
|
Readings |
|
1 |
Craiger - Computer Forensics Procedures |
|
Craiger - Computer Forensics Procedures |
Assignment |
NTFS |
|
1 |
Microsoft's New Technology File System (NTFS).
Length: 27 Minutes
|
|
NTFS 1 of 2 |
|
2 |
Continuation of the first NTFS video
Length: 23 Minutes
|
|
NTFS 2 of 2 |
|
3 |
A brief look at some of the things in NTFS.
Length: 6 Minutes
|
|
NTFS Demo |
|
4 |
Hiding data using Alternate Data Streams in NTFS
Length: 15 Minutes
|
|
Alternate Data Streams |
|
5 |
|
|
Sleuthkit |
Assignment |
Mac and Linux file systems |
|
1 |
|
|
HFS+ |
|
2 |
|
|
EXT 1 of 2 |
|
3 |
|
|
EXT 2 of 2 |
|
Readings |
|
1 |
|
|
Mac Forensics (Burke & Craiger) |
|
2 |
|
|
Mac OS Forensics (Craiger & Burke) |
Assignment |
Capturing RAM and Swap |
|
1 |
|
|
FTK Imager (imager and RAM capture tool) |
|
2 |
|
|
Capturing RAM and Swap files |
|
Readings |
|
1 |
|
|
RAM Capture Readings |
Assignment |
Forensic examinations |
|
1 |
|
|
Introduction to FTK |
|
Readings |
|
1 |
Chapters 10 - Recovering Graphics Files and Chapter 12 - Email Investigations |
|
|
Assignment |
Mobile Device Forensics |
|
|
|
|
|
|
Readings |
|
1 |
|
|
iPhone forensics |
|
2 |
|
|
Forensics of iPhone backup made by iTunes |
|
3 |
|
|
Forensics analysis of an iPhone |
|
|
|
|
|
Final Assignment |
|
|
|
|
Final Assignment |
|
|
|
|
|
FrontPage
Supporting Courses

Comments (0)
You don't have permission to comment on this page.