Course list http://www.c-jump.com/bcc/

BRISTOL Cyber Security and Digital Forensics -- Autopsy Organizing Data Into a Case


  1. Organizing a Case
  2. What is a case?
  3. Making a Case
  4. Creating a Case
  5. Case Metadata (optional)
  6. Case Directory
  7. Case Directory Contents
  8. What are Data Sources?
  9. Data Sources
  10. What Happens to the data from a Data Source?
  11. What Gets Stored in the Database?
  12. Disk Image Formats
  13. Disk Image Analysis
  14. Volume System Analysis
  15. Volume System Analysis (cont.)
  16. File System Analysis
  17. Orphan Files
  18. File Carving
  19. Carving Example
  20. Carving Example (cont.)
  21. Carving Process
  22. Carving Process in Autopsy
  23. Unallocated Space
  24. Adding a Disk Image
  25. Disk Image Limitations
  26. Data Sources: Local Drives
  27. Local Drive Analysis
  28. Local Drive Analysis (cont.)
  29. Making a VHD File
  30. Making a VHD File in Autopsy
  31. Local Files
  32. Local Files (cont.)
  33. Local File Sets
  34. Summary

1. Organizing a Case



2. What is a case?



3. Making a Case



4. Creating a Case



5. Case Metadata (optional)



6. Case Directory



7. Case Directory Contents



8. What are Data Sources?



9. Data Sources



10. What Happens to the data from a Data Source?



11. What Gets Stored in the Database?



12. Disk Image Formats



13. Disk Image Analysis



14. Volume System Analysis



15. Volume System Analysis (cont.)



16. File System Analysis



17. Orphan Files



18. File Carving



19. Carving Example



20. Carving Example (cont.)



21. Carving Process



22. Carving Process in Autopsy



23. Unallocated Space



24. Adding a Disk Image



25. Disk Image Limitations



26. Data Sources: Local Drives



27. Local Drive Analysis



28. Local Drive Analysis (cont.)



29. Making a VHD File



30. Making a VHD File in Autopsy



31. Local Files



32. Local Files (cont.)



33. Local File Sets



34. Summary