This document provides an overview of cyber forensics. It discusses key concepts like the digital forensics investigation process, states of data including data at rest, in use, and in transit, network forensics, and event log analysis. The document also covers topics such as disk imaging and cloning to analyze data at rest, live analysis techniques for data in use, methods to acquire network-based evidence including packet sniffers and logs, and potential event log sources.