EnCase Computer Forensics -- The Official EnCE by Steve Bunting
Author:Steve Bunting
Language: eng
Format: epub
Publisher: Wiley Publishing, Inc.
Published: 2012-08-19T16:00:00+00:00
Exam Essentials
Understand how EnCase organizes its workspace. Understand the Home screen and explain how to open and create cases. Explain how to add evidence or browse evidence from the Home screen. Understand the Evidence tab entries view. Explain the Tree pane, Table pane, and View pane as to what data is displayed in each and how they interact. Describe the Table, Gallery, and Timeline views from the Table pane. Explain how to launch the Disk view and explain its purpose and features. Explain the concept of multidimensional data and how it can be viewed in the View pane. Be able to list which tabs are found in the View pane.
Understand how EnCase stores configuration and case data. Explain how and where EnCase creates paths and filenames for the various case-related files. Understand where EnCase stores both its global and user configuration files and what types of data are stored in each of the various configuration files.
Understand how to navigate within EnCase. Understand the hierarchical tree structure displayed in the Tree pane. Know the function of the Set Included Folders trigger and the file selection functions. Understand and be able to explain how they differ. Know how to move, sort, hide, and lock columns in the Table view. Understand what information is provided in the Report view and how it can be used. Explain the Gallery view and what information will be displayed and under what conditions. Explain the function and importance of the Timeline view. Know the function and purpose of the Disk view and be able to explain the meaning of the various color-coded elements.
Understand and explain the differences between the Text and Hex views. Describe the purpose of and know how to create and select a text style. Explain how to use the Options and Codepage menus to create dynamic text styles. Also describe the purpose of the Report view in the View pane. Explain the purpose and function of the Permissions tab. Explain the purpose and function of the File Extents tab.
Explain the Docs view and how the Transcripts view is both similar and dissimilar. Describe how the Pictures tab on the View pane functions. Explain the purpose and function of the Lock button. Understand and be able to explain the Dixon box and how it assists the examiner.
Understand the EnCase menu system. Be able to locate and describe the various toolbars that are in the various EnCase views. For any given menu on the Evidence toolbar, be able to describe the various functions available. Explain the function and contents of the right-side menu and how it relates to the other menus on the same toolbar.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(2920)
Mastering Python for Networking and Security by José Manuel Ortega(2903)
Blockchain Basics by Daniel Drescher(2868)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2498)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2467)
The Art Of Deception by Kevin Mitnick(2278)
The Code Book by Simon Singh(2192)
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(2040)
Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(1917)
DarkMarket by Misha Glenny(1837)
Applied Network Security by Arthur Salmon & Michael McLafferty & Warun Levesque(1837)
Wireless Hacking 101 by Karina Astudillo(1834)
Mobile Forensics Cookbook by Igor Mikhaylov(1803)
Hands-On AWS Penetration Testing with Kali Linux by Benjamin Caudill & Karl Gilbert(1802)
Serious Cryptography: A Practical Introduction to Modern Encryption by Aumasson Jean-Philippe(1795)
Bulletproof Android: Practical Advice for Building Secure Apps (Developer's Library) by Godfrey Nolan(1663)
Solidity Programming Essentials by Ritesh Modi(1656)
Foundations of Blockchain by Koshik Raj(1596)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(1589)