Please enable JavaScript.
Coggle requires JavaScript to display documents.
[Performing Forensic Analysis and Techniques] - Coggle Diagram
[Performing Forensic Analysis and Techniques]
Building a Forensics Capability
Building a Forensic Toolkit
Key Toolkit Components
Mobile Device
Forensic Toolkit Components
Understanding Forensic Software
Capabilities and Application
Imaging Media and Drives
Analysis Utilities
Carving
Chain-of-Custody Tracking
Legal Holds
is conducted when information must be retained for a legal in case
Hashing and Validation
The goal of this process is to ensure that the
copy exactly matches the source drive or device
Conducting Endpoint Forensics
Operating System, Process, and Memory Dump
Analysis
Disk Forensics
Memory Forensics
Mobile Device and Cell Phone Forensics
Password Crackers and Password Recovery
Cryptography Tools
Log Viewers
Network Forensics
Wireshark Network Forensics
Tcpdump Network Forensics
Cloud, Virtual, and Container Forensics
Performing Cloud Service Forensics
Performing Virtualization Forensics
Container Forensics
Conducting a Forensic Investigation