Course curriculum

  • 1

    Intro to HiTech Forensics

  • 2

    Intro to HiTech Forensics

  • 3

    Electronic Discovery

    • Setting Up Computer Forensics Lab
    • Understanding File Systems
    • Windows Registry Forensics
    • Hard Drive Recovery
    • Mobile Forensics
    • Group Forum Discussion: Security Standards
    • About the Registry - Microsoft
    • Validation of Forensic Tools and Software: A Quick Guide for the Forensic Examiner
    • Reading Assignment
    • Module 3 Prep Review Quiz
  • 4

    Electronic Discovery Advanced

    • Crimes involving Email
    • Utilizing Access Data FTK
    • Reading Assignment
    • Becoming an Expert Witness
    • Social Media Investigations
    • Defining Open Source Intelligence
    • A World of Sock Puppets
    • Documenting Social Media
    • Building Your Digital Case File
    • How to Keep Yourself Protected
    • Which Domain Tools to Use
    • Considerations for Instant Messaging Investigations
    • Invaluable Websites for Conducting People Searches
    • Using Suspect's Usernames to Search Multiple Platforms
    • Investigating Suspects on Facebook
    • The Incredible Tool Known as Facebook Graph Search
    • An Exploration into the New MySpace
    • The Powerhouse of Information Known as LinkedIn
    • Social Monitoring and Tracking Suspects on Twitter
    • Geo Tracking News, Media, and Businesses
    • Creating False Personas and New Identities
    • Advanced Social Media Investigations In Conclusion
    • Becoming an Expert Witness
    • Common Task of an Expert Witness
    • Preparing to Become an Expert Witness
    • Your Role as a Consultant
    • How to Prepare Your Testimony for Court
    • Preparing Forensic and Computer Evidence
    • Summary
    • Group Forum Discussion: Crimes Involving Email
    • Week 4 Prep Review
  • 5

    Computer Forensics ( Week 5)

    • Picture and Video File Review
    • Internet History Reconstruction
    • Digital Evidence: Legal Procedures and Practices
    • Covert and Remote Collection
    • Wireless Networks and Wireless Network Attacks
    • Reading Assignment
    • Group Forum Discussion: Steganography Tools
    • Week 5 Prep Review
  • 6

    Computer Forensics (Week 6)

  • 7

    Hi Tech Investigations (Week 7)

    • Trade Secrets/IP Theft (Reading Assignment)
    • Trade Secret / IP Theft
    • Breach of Privacy
    • Workplace Misconduct
    • Week 7 Prep Review Quiz
  • 8

    Hi Tech Investigations (Week 8)

    • Cyberstalking FREE PREVIEW
    • Inappropriate Material
    • Embezzlement and Fraud
    • Cyberstalking/Piracy/Embezzlement (Reading Assignment Week 8)
    • Week 8 Prep Review
  • 9

    Cell Phone & Mobile Device Forensics (Week 9)

    • Intro to Mobile Forensics
    • Mobile Forensics Acquisition
    • Mobile Forensics Examination & Analysis
    • Procedures and Principles
    • Mobile Phone Acquisition/Examination/Reporting (Reading Assignment)
  • 10

    Cell Phone & Mobile Device Forensics (Week 10)

    • Social Media Apps
    • Facebook
    • Twitter
    • Instagram
    • Kik
    • Mobile Phone File Systems Reading Assignment (Week 10)
  • 11

    Legal Fundamentals (Week 13)

    • Legal Fundamentals
  • 12

    Final Exam

    • Purchase Final Exam