Home > Training Programs > Other > Forensic Computer Examiner


Fill out the form below

Close Window

Thank you for your interest in this program. We should be contacting you shortly.

Close Window

Forensic Computer Examiner

$3,095.00 (USD)



I.    Module 1- Introduction to Computer Forensics

    A.    Recommended Machine Configurations
    B.    What makes a good computer forensic examiner?
    C.    Computer Forensics vs. E Discovery
    D.    Dealing with clients or employers
        1.    Work Product
        2.    lient Contracts
        3.    Legal and privacy issues
    E.    Software Licensing
    F.    Ethical Conduct Issues
    G.    Cases that may include digital evidence
    H.    Forensic Examination Procedures
    I.    Determining Scope of Examinations
    J.    Hardware and Imaging Issues
    K.    Floppy Diskette, USB and Optical Media Examination
    L.    Limited Examinations
    M.    Forensically Sterile Examination Media
    N.    Examination Documentation and Reports
    O.    ASCII Table
    P.    General Overview of Boot Process and Operating Systems
    Q.    Floppy Diskette Sides, FD Tracks, Hard Disk Drives
    R.    BIOS History
    S.    Networked Computers
    T.    Media Acquisition
    U.    Acquisition Documentation
    V.    Chain of Custody

II.    Module 2 – Imaging

    A.    Recommended Machine Configurations
    B.    Imaging Theory and Process
    C.    Imaging Methods
    D.    Write Blocking
    E.    Imaging Flash Drives
    F.    Wiping, Hashing, Validation, Image Restoration, Cloning, Unallocated Space
    G.    Drive Partitioning
    H.    One (1) Student Lab Practical Exercise

III.    Module 3 – File Signatures, Data Formats & Unallocated Space

    A.    File Identification
    B.    File Headers
    C.    General File Types
    D.    File Viewers
    E.    Examination of Compressed Files
    F.    Data Carving – Using Simple Carver
    G.    One (1) Student Lab Practical Exercise

IV.    Module 4 – FAT File System

    A.    Logical structures of DOS, Windows 95, Windows 98
    B.    Master Boot Record
    C.    File Allocation Table
        1.    16 Bit FAT
        2.    32 Bit FAT
    D.    Directory Entries
    E.    Clusters
    F.    Unallocated Space
    G.    Sub-Directories
    H.    FORMAT
    I.    Six (6) Student Lab Practical Exercises

V.    Module 5 – NTFS File System

    A.    Introduction and Overview
    B.    Basic Terms
    C.    Basic Boot Record Information
    D.    Time Stamps
    E.    Root Directory
    F.    Recycle Bin
    G.    File Creation
    H.    File Deletion
    I.    Examining NTFS Drives
    J.    Two (2) Student Lab Practical Exercises

VI.    Module 6 – Registry & Artifacts

    A.    Creating an Examination Boot Disk
    B.    Data Recovery
    C.    Windows Swap and Page Files
    D.    Forensic Analysis of the Windows Registry
    E.    Internet Cache Files, Cookies and Internet Sites
    F.    Microsoft Outlook
    G.    MSMAIL
    H.    Logical Structures
    I.    Tracking User Specific Computer Use
    J.    Internet Explorer Cache Index
    K.    Basic Mail Issues
    L.    Basic Internet Issues
    M.    Common Situations Encountered during Examinations
    N.    Password Protection and Defeating Passwords
    O.    Compound Documents
    P.    Examining CDR Media
    Q.    FTK
    R.    Three (3) Student Lab Practical Exercises

VII.    Module 7 – Forensic Policy, Case Writing, Legal Process & Forensic Tool Kits

    A.    Use of Policy and Checklists in Forensic Practice
    B.    Data Presentation to Client
    C.    Case Report Writing
    D.    Legal Process
    E.    Expert Admission
    F.    Going to Court
    G.    Use of Forensic Tools and Software
    H.    One (1) Student Lab Practical Exercise – Hard drive examination

VIII.    Module 8 - Introduction to Mobile Data Exploitation

    A.    Mobile Phone Extraction Process
        1.    Collection
        2.    Isolation
        3.    Interrogation
        4.    Imaging
        5.    Analysis
    B.    Mobile Networks
    C.    International Mobile Subscriber Identity
    D.    Use of Forensic Tools and Software
    E.    One (1) Student Lab Practical Exercise






The State University of New York - Fredonia
Extended Learning
2146 Fenton Hall
Fredonia, NY 14063 US

Copyright © Education To Go. All rights reserved. The material on this site cannot be reproduced or redistributed unless you have obtained prior written permission from Education To Go. Education To Go and ed2go are registered trademarks of Education To Go, a part of Cengage Learning.