(as of Nov 04, 2023 06:56:36 UTC – Details)
Learn Computer Forensics from a veteran investigator and technical trainer and explore how to properly document digital evidence collected
Key FeaturesInvestigate the core methods of computer forensics to procure and secure advanced digital evidence skillfullyRecord the digital evidence collected and organize a forensic examination on itPerform an assortment of Windows scientific examinations to analyze and overcome complex challengesBook Description
Computer Forensics, being a broad topic, involves a variety of skills which will involve seizing electronic evidence, acquiring data from electronic evidence, data analysis, and finally developing a forensic report.
This book will help you to build up the skills you need to work in a highly technical environment. This book’s ideal goal is to get you up and running with forensics tools and techniques to successfully investigate crime and corporate misconduct. You will discover ways to collect personal information about an individual from online sources. You will also learn how criminal investigations are performed online while preserving data such as e-mails, images, and videos that may be important to a case. You will further explore networking and understand Network Topologies, IP Addressing, and Network Devices. Finally, you will how to write a proper forensic report, the most exciting portion of the forensic exam process.
By the end of this book, you will have developed a clear understanding of how to acquire, analyze, and present digital evidence, like a proficient computer forensics investigator.
What you will learnExplore the investigative process, rules of evidence, legal process, and ethical guidelinesUnderstand the difference between sectors, clusters, volumes, and file slackValidate forensic equipment, computer program, and examination methodsCreate and validate forensically sterile mediaGain the ability to draw conclusions based on the exam discoveriesRecord discoveries utilizing the technically correct terminologyDiscover the limitations and guidelines for RAM Capture and its toolsExplore timeline analysis, media analysis, string searches, and recovery of deleted dataWho this book is for
This book is for IT beginners, students, or an investigator in the public or private sector. This book will also help IT professionals who are new to incident response and digital forensics and are looking at choosing cybersecurity as their career. Individuals planning to pass the Certified Forensic Computer Examiner (CFCE) certification will also find this book useful.
Table of ContentsTypes of Computer-Based InvestigationsThe Forensic Analysis ProcessAcquisition of EvidenceComputer SystemsComputer Investigation ProcessWindows Artifact AnalysisRAM Memory Forensic AnalysisEmail Forensics – Investigation TechniquesInternet ArtifactsOnline InvestigationsNetworking BasicsReport WritingExpert Witness EthicsAssessments
From the Publisher
Key Features: Learn about the field of computer forensics Understand common Windows-based operating system artifacts Be able to select open-source and commercial forensic tools Understand how to provide an effective testimony
What’s new in this second edition?
I’ve gone through the entire book to ensure that I enhanced anything I didn’t like in the previous edition. I’ve also updated some parts to reflect new or changed features in software or operating system artifacts. Finally, I’ve added two new chapters covering online investigations and networking basics, along with academic resources available for educators teaching computer forensics.
Academic resources New chapter – Online Investigations New Chapter – Network Basics Case studies of successful digital investigations
What trajectory does this book take to help its readers learn computer forensics?
The book is structured to take the reader from the beginning of the journey to becoming a computer forensic investigator, from selecting hardware and software to be used in the investigation to in-depth analysis of Windows-based operating system artifacts. I’ve also included discussions about note-taking, ethics, and how to testify about the investigation findings.
This edition includes exercises that will allow the reader to practice the skills presented in the book. Educators will also have access to a set of academic resources to assist them in teaching computer forensics.
At the completion of the book, readers will have an understanding and instinctively know how to approach challenges concerning computer forensic investigations. My goal is for this book to be a resource for digital investigators of any level of expertise.
What are the key takeaways of this book?
No one can remember everything that concerns a digital investigation, which can be far more intimidating for a novice. Reading this book can help reduce that fear and allow beginners to understand the requirements of digital investigation. I want this book to be a resource for new investigators and academic instructors teaching the next generation of forensic investigators. This is why I’ve included tips from my experiences and those of other investigators to help new investigators bypass some of the hurdles they may encounter.
Publisher : Packt Publishing; 2nd ed. edition (July 29, 2022)
Language : English
Paperback : 434 pages
ISBN-10 : 1803238305
ISBN-13 : 978-1803238302
Item Weight : 1.64 pounds
Dimensions : 7.5 x 0.98 x 9.25 inches