Reference no: EM133106829
Digital Forensics Fundamentals
Learning Outcome 1: Apply good practice to the capture of digital evidence, based on published rules and guidelines.
Learning Outcome 2: Select appropriate methods and tools for forensic capture and investigation of digital evidence.
Learning Outcome 3: Write a report based on standards for forensic investigation.
Task:
Scenario:
A UK-based IT consultancy which has an impressive profile in international digital forensics business consultancy decided to provide a free 12-weeks training course for 20 Ethical Hacking and Cybersecurity students/graduates. The trainees will be acquainted with the latest industry tools for device analysis and by the end of the training course will be given a forensics image to test the acquired skills they gained from the training course. The company announced that they will offer 5 permanent forensics analyst posts for the best trainees to meet their demand in forensics experts.
Your application has qualified you for this training course and you have been nominated to be one of the trainees. By the end of the training course, you have been given the associated virtual hard disk Drive.vhdxand been asked to apply your learning to investigate the case.
You are required to perform a professional digital forensics examination and write a detailed forensics report about your findings and use it to show your skills.
Task:
• You should use the required forensics tools to investigate the case.
• As the data is in a format of a VHD, your top priority is to secure the evidence from the VHD into a forensic format, and easily verifiable and further sharable between investigators. Make sure that the new file you have created has all the required
metadata with it and include those details in your report.
• The report should include evidence (such as screenshots) of the processing procedures/methods that you have used to investigate the case and obtain the findings.
• You should find out what is the case this evidence relates to, you need to compile as detailed as possible timeline of criminal activity evidence you find in the case files by performing a forensic analysis, to the best of your abilities.
• You should also briefly comment on the feasibility if at least some of the generated evidence are still being admissible to court.
• You are also required to add some related information such as the forensic image hash and metadata information, including the case information.
Attachment:- Digital Forensics Fundamentals.rar