Corporate Computer Forensics Training System Laboratory Manual Volume I Contributor(s): Training Systems, Cyber Defense (Author), Lewis, J. A. (Author) |
|
ISBN: 0615155944 ISBN-13: 9780615155944 Publisher: Cyber Defense Training System OUR PRICE: $52.25 Product Type: Paperback - Other Formats Published: December 2019 Annotation: This is the laboratory and exercise manual to accompany the text manual for Volume I of a corporate and law enforcement computer and digital forensics training system. This training system consists of a text manual with explanations and descriptions with more than 200 pictures, drawings and diagrams. This laboratory and exercise manual contains more than 40 forensic exercises to help prepare students for entry into the profession as a corporate or law enforcement computer examiner. The information presented in this training system is updated by industry practice and research. This training system is designed to be used in a lecture / demonstration environment and requires the use of associated case image files. |
Additional Information |
BISAC Categories: - Computers | Programming Languages - General |
Dewey: 005 |
Physical Information: 0.61" H x 8.25" W x 11" (1.46 lbs) 292 pages |
Descriptions, Reviews, Etc. |
Publisher Description: 6th Edition. REVISED FOR 2020 This is the exercise manual to accompany the text manual for Volume I of a corporate and law enforcement computer and digital forensics training system. This training system consists of a text and exercise manual with explanations and descriptions with more than 200 pictures, drawings and diagrams. The text and associated exercise manual contains more than 60 forensic exercises, diagrams and assignments to help prepare students for entry into the profession as a computer examiner. Eleven modules on topics include an introduction to computer and digital forensics, file structures, disk geometry, examining the Windows registry for evidence data, media acquisition and bit stream image analysis, how to perform a forensic examination, industry certifications, case file analysis, reporting and licensing, evidence handling, password recovery and anti-forensics. Various forensic tools are introduced. Instructions for obtaining the associated case image files are included in the text. |