SlideShare a Scribd company logo
1 of 107
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence
Module 04 digital evidence

More Related Content

What's hot

Cyber forensic investigation & Analysis
Cyber forensic investigation & AnalysisCyber forensic investigation & Analysis
Cyber forensic investigation & AnalysisAnshul Tayal
 
Cyber Security - Unit - 4 - Introduction to Cyber Crime and law Cyber Crimes
Cyber Security - Unit - 4 - Introduction to Cyber Crime and law Cyber CrimesCyber Security - Unit - 4 - Introduction to Cyber Crime and law Cyber Crimes
Cyber Security - Unit - 4 - Introduction to Cyber Crime and law Cyber CrimesGyanmanjari Institute Of Technology
 
Android forensics (Manish Chasta)
Android forensics (Manish Chasta)Android forensics (Manish Chasta)
Android forensics (Manish Chasta)ClubHack
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsFilip Maertens
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - NotesKranthi
 
Ninđa-Osveta je njegova-Patrikovi romani
Ninđa-Osveta je njegova-Patrikovi romaniNinđa-Osveta je njegova-Patrikovi romani
Ninđa-Osveta je njegova-Patrikovi romaniDijana Martic Mrkonja
 
Android malware analysis
Android malware analysisAndroid malware analysis
Android malware analysisJason Ross
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logsanilinvns
 
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimesModule 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimessagaroceanic11
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - NotesKranthi
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniDr Raghu Khimani
 

What's hot (20)

Cyber forensic investigation & Analysis
Cyber forensic investigation & AnalysisCyber forensic investigation & Analysis
Cyber forensic investigation & Analysis
 
Cyber Security - Unit - 4 - Introduction to Cyber Crime and law Cyber Crimes
Cyber Security - Unit - 4 - Introduction to Cyber Crime and law Cyber CrimesCyber Security - Unit - 4 - Introduction to Cyber Crime and law Cyber Crimes
Cyber Security - Unit - 4 - Introduction to Cyber Crime and law Cyber Crimes
 
Windowsforensics
WindowsforensicsWindowsforensics
Windowsforensics
 
Mobile forensic
Mobile forensicMobile forensic
Mobile forensic
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Malware forensics
Malware forensicsMalware forensics
Malware forensics
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Android forensics (Manish Chasta)
Android forensics (Manish Chasta)Android forensics (Manish Chasta)
Android forensics (Manish Chasta)
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
Network forensics1
Network forensics1Network forensics1
Network forensics1
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Malware Incident Response
Malware Incident ResponseMalware Incident Response
Malware Incident Response
 
Ninđa-Osveta je njegova-Patrikovi romani
Ninđa-Osveta je njegova-Patrikovi romaniNinđa-Osveta je njegova-Patrikovi romani
Ninđa-Osveta je njegova-Patrikovi romani
 
Android malware analysis
Android malware analysisAndroid malware analysis
Android malware analysis
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logs
 
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimesModule 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - Notes
 
Browser forensics
Browser forensicsBrowser forensics
Browser forensics
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 

Viewers also liked

Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To HackingRaghav Bisht
 
Module 03 searching and seizing computers
Module 03 searching and seizing computersModule 03 searching and seizing computers
Module 03 searching and seizing computerssagaroceanic11
 
Module 20 mobile forensics
Module 20 mobile forensicsModule 20 mobile forensics
Module 20 mobile forensicssagaroceanic11
 
Module 18 investigating web attacks
Module 18 investigating web attacksModule 18 investigating web attacks
Module 18 investigating web attackssagaroceanic11
 
EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9ITpreneurs
 
Module 21 investigative reports
Module 21 investigative reportsModule 21 investigative reports
Module 21 investigative reportssagaroceanic11
 

Viewers also liked (7)

CHFI v8
CHFI v8CHFI v8
CHFI v8
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
 
Module 03 searching and seizing computers
Module 03 searching and seizing computersModule 03 searching and seizing computers
Module 03 searching and seizing computers
 
Module 20 mobile forensics
Module 20 mobile forensicsModule 20 mobile forensics
Module 20 mobile forensics
 
Module 18 investigating web attacks
Module 18 investigating web attacksModule 18 investigating web attacks
Module 18 investigating web attacks
 
EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9
 
Module 21 investigative reports
Module 21 investigative reportsModule 21 investigative reports
Module 21 investigative reports
 

More from sagaroceanic11

Module 01 computer forensics in todays world
Module 01 computer forensics in todays worldModule 01 computer forensics in todays world
Module 01 computer forensics in todays worldsagaroceanic11
 
Virtualisation with v mware
Virtualisation with v mwareVirtualisation with v mware
Virtualisation with v mwaresagaroceanic11
 
Virtualisation overview
Virtualisation overviewVirtualisation overview
Virtualisation overviewsagaroceanic11
 
Introduction to virtualisation
Introduction to virtualisationIntroduction to virtualisation
Introduction to virtualisationsagaroceanic11
 
2 the service lifecycle
2 the service lifecycle2 the service lifecycle
2 the service lifecyclesagaroceanic11
 
1 introduction to itil v[1].3
1 introduction to itil v[1].31 introduction to itil v[1].3
1 introduction to itil v[1].3sagaroceanic11
 
Visual studio 2008 overview
Visual studio 2008 overviewVisual studio 2008 overview
Visual studio 2008 overviewsagaroceanic11
 
Rubyforjavaprogrammers 1210167973516759-9
Rubyforjavaprogrammers 1210167973516759-9Rubyforjavaprogrammers 1210167973516759-9
Rubyforjavaprogrammers 1210167973516759-9sagaroceanic11
 
Presentationrubyonrails 1221891563546619-8
Presentationrubyonrails 1221891563546619-8Presentationrubyonrails 1221891563546619-8
Presentationrubyonrails 1221891563546619-8sagaroceanic11
 
Understanding san ( storage area network )
Understanding san ( storage area network )Understanding san ( storage area network )
Understanding san ( storage area network )sagaroceanic11
 
Understanding nas (network attached storage)
Understanding nas (network attached storage)Understanding nas (network attached storage)
Understanding nas (network attached storage)sagaroceanic11
 
Storage networking-technologies
Storage networking-technologiesStorage networking-technologies
Storage networking-technologiessagaroceanic11
 

More from sagaroceanic11 (20)

Module 01 computer forensics in todays world
Module 01 computer forensics in todays worldModule 01 computer forensics in todays world
Module 01 computer forensics in todays world
 
Virtualisation with v mware
Virtualisation with v mwareVirtualisation with v mware
Virtualisation with v mware
 
Virtualisation overview
Virtualisation overviewVirtualisation overview
Virtualisation overview
 
Virtualisation basics
Virtualisation basicsVirtualisation basics
Virtualisation basics
 
Introduction to virtualisation
Introduction to virtualisationIntroduction to virtualisation
Introduction to virtualisation
 
6 service operation
6 service operation6 service operation
6 service operation
 
5 service transition
5 service transition5 service transition
5 service transition
 
4 service design
4 service design4 service design
4 service design
 
3 service strategy
3 service strategy3 service strategy
3 service strategy
 
2 the service lifecycle
2 the service lifecycle2 the service lifecycle
2 the service lifecycle
 
1 introduction to itil v[1].3
1 introduction to itil v[1].31 introduction to itil v[1].3
1 introduction to itil v[1].3
 
Visual studio 2008 overview
Visual studio 2008 overviewVisual studio 2008 overview
Visual studio 2008 overview
 
Vb introduction.
Vb introduction.Vb introduction.
Vb introduction.
 
Vb essentials
Vb essentialsVb essentials
Vb essentials
 
Vb basics
Vb basicsVb basics
Vb basics
 
Rubyforjavaprogrammers 1210167973516759-9
Rubyforjavaprogrammers 1210167973516759-9Rubyforjavaprogrammers 1210167973516759-9
Rubyforjavaprogrammers 1210167973516759-9
 
Presentationrubyonrails 1221891563546619-8
Presentationrubyonrails 1221891563546619-8Presentationrubyonrails 1221891563546619-8
Presentationrubyonrails 1221891563546619-8
 
Understanding san ( storage area network )
Understanding san ( storage area network )Understanding san ( storage area network )
Understanding san ( storage area network )
 
Understanding nas (network attached storage)
Understanding nas (network attached storage)Understanding nas (network attached storage)
Understanding nas (network attached storage)
 
Storage networking-technologies
Storage networking-technologiesStorage networking-technologies
Storage networking-technologies