| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!

View
 

All Course Lectures

This version was saved 10 years, 3 months ago View current version     Page history
Saved by Sean Ellis
on December 3, 2013 at 1:04:44 am
 

CET4861 Lectures Page

 

Lectures that are useful for the materials in this course will be posted on this page. In addition to lectures produced for this class, this page also includes lectures from other courses.

 

I strongly suggest you download these files to your computer, that way you can view the video on your host system and have access to it at any time (even when you are offline).  Also, run the video in your host system (Windows, whatever) and have your VM open while I work through the video. Pause the video when I run the command, duplicate the command.  Does it work? Great! You're doing it correctly.  Doesn't work? You're doing it wrong!  That's the only way to learn Linux, by DOING!  Now have fun!

 

 
 
Topics
  Link
Introduction
  
 1

Introduction & expectations that apply to all of my courses.  Once you've had one course with me you'll know what I expect in every other course, but make sure you view this first!

 

Length: 22 Minutes

 

Introduction to Dr. Craiger's courses

  2

Syllabus contents and class details to CET4861.  These are the gritty details of the course.  Please make sure to read the syllabus thoroughly and follow along with this lecture.

 

Length: 11 Minutes

 

Introduction to CET4861

4860 Review (Dr. Craiger's way)
  Videos for review only 
  1

Introduction to forensics, basic forensics procedures, and dealing with evidence

 

Length: 28 Minutes

  Forensic process
  2

 Steps to create a disk image, verify a disk image, and document the process.

 

Length: 8 Minutes

 
Imaging
  3

One-way cryptographic hashing. Verify files with MD5 cryptographic hashes on Linux and windows. Analyze a disk image safely in read-only mode.

 

Length: 21 Minutes

  Verification
  4

A look at the details of the Virtual File Allocation Table File System (VFAT) 

 

Length: 30 Minutes

  VFAT file system 
  Sample of Tools for Forensic Examination 
  1

Brief overview of FTK Imager such as adding a drive, creating a hash of a drive, and creating a disk image.

 

Length: 19 Minutes

  FTK Imager
  2

Creating an image and file hashes using ProDiscover

 

Length: 17 Minutes 

  ProDiscover
  3

How to image and verify a drive using Linux. Use dd to image a drive in Linux, obtain file information with file, and multiple methods to create and view hashes.

 

Length: 20 Minutes

  Linux dd
  Readings
  1 Craiger - Computer Forensics Procedures    Craiger - Computer Forensics Procedures
Assignment
NTFS
  1

Microsoft's New Technology File System (NTFS). 

 

Length: 27 Minutes

  NTFS 1 of 2
  2

Continuation of the first NTFS video 

 

Length: 23 Minutes

  NTFS 2 of 2 
  3

A brief look at some of the things in NTFS.

 

Length: 6 Minutes

  NTFS Demo
  4

Hiding data using Alternate Data Streams in NTFS

 

Length: 15 Minutes

  Alternate Data Streams
  5

Install Sleuthkit and use it to forensically analyze an image of a file system.

 

Length: 30 Minutes

  Sleuthkit
Assignment 
Mac and Linux file systems
  1     HFS+ 
  2     EXT 1 of 2
  3     EXT 2 of 2
  Readings
  1 Mac Forensics (Burke & Craiger)    Mac Forensics (Burke & Craiger)
  2 Mac OS Forensics (Craiger & Burke)    Mac OS Forensics (Craiger & Burke)
Assignment
Capturing RAM and Swap
  1     FTK Imager (imager and RAM capture tool) 
  2     Capturing RAM and Swap files
  Readings
  1     RAM Capture Readings
Assignment
Forensic examinations
  1     Introduction to FTK 
  Readings 
  1 Chapters 10 - Recovering Graphics Files and Chapter 12 - Email Investigations    
Assignment
Mobile Device Forensics
         
  Readings 
  1  
  iPhone forensics
  2     Forensics of iPhone backup made by iTunes
  3     Forensics analysis of an iPhone
         
Final Assignment
        Final Assignment 
         

 

 

 

FrontPage

Supporting Courses

 

 

Comments (0)

You don't have permission to comment on this page.