EnCase Computer Forensics -- The Official EnCE by Steve Bunting
Author:Steve Bunting
Language: eng
Format: epub
Publisher: Wiley Publishing, Inc.
Published: 2012-08-19T16:00:00+00:00
Exam Essentials
Understand how EnCase organizes its workspace. Understand the Home screen and explain how to open and create cases. Explain how to add evidence or browse evidence from the Home screen. Understand the Evidence tab entries view. Explain the Tree pane, Table pane, and View pane as to what data is displayed in each and how they interact. Describe the Table, Gallery, and Timeline views from the Table pane. Explain how to launch the Disk view and explain its purpose and features. Explain the concept of multidimensional data and how it can be viewed in the View pane. Be able to list which tabs are found in the View pane.
Understand how EnCase stores configuration and case data. Explain how and where EnCase creates paths and filenames for the various case-related files. Understand where EnCase stores both its global and user configuration files and what types of data are stored in each of the various configuration files.
Understand how to navigate within EnCase. Understand the hierarchical tree structure displayed in the Tree pane. Know the function of the Set Included Folders trigger and the file selection functions. Understand and be able to explain how they differ. Know how to move, sort, hide, and lock columns in the Table view. Understand what information is provided in the Report view and how it can be used. Explain the Gallery view and what information will be displayed and under what conditions. Explain the function and importance of the Timeline view. Know the function and purpose of the Disk view and be able to explain the meaning of the various color-coded elements.
Understand and explain the differences between the Text and Hex views. Describe the purpose of and know how to create and select a text style. Explain how to use the Options and Codepage menus to create dynamic text styles. Also describe the purpose of the Report view in the View pane. Explain the purpose and function of the Permissions tab. Explain the purpose and function of the File Extents tab.
Explain the Docs view and how the Transcripts view is both similar and dissimilar. Describe how the Pictures tab on the View pane functions. Explain the purpose and function of the Lock button. Understand and be able to explain the Dixon box and how it assists the examiner.
Understand the EnCase menu system. Be able to locate and describe the various toolbars that are in the various EnCase views. For any given menu on the Evidence toolbar, be able to describe the various functions available. Explain the function and contents of the right-side menu and how it relates to the other menus on the same toolbar.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6541)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6258)
Machine Learning Security Principles by John Paul Mueller(6231)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5902)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5863)
Solidity Programming Essentials by Ritesh Modi(4013)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3656)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3388)
Future Crimes by Marc Goodman(3346)
Mastering Python for Networking and Security by José Manuel Ortega(3344)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3330)
Blockchain Basics by Daniel Drescher(3294)
Learn Computer Forensics - Second Edition by William Oettinger(3152)
Mobile App Reverse Engineering by Abhinav Mishra(2880)
Incident Response with Threat Intelligence by Roberto MartÃnez(2871)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2868)
The Code Book by Simon Singh(2824)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2779)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2713)
