From the course: Computer Hacking Forensics Investigator (CHFI) Cert Prep

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

Course summary

Course summary

Hey, everyone. Welcome back. So, again, thank you so much for taking the course. I just want to kind of recap what we talked about throughout the entire course here. So in Module 1, we talked about computer forensics today. So we talked about in general, background on computer forensics, a little bit of history as well as some of the information we'll be covering throughout the rest of the course. Module 2, we talked about the forensic process. So, you know, the pre-investigation phase, the investigation phase, and the post-investigation phase. Module 3, we talked about hard disk and file systems. Module 4, we went over data acquisition, so different ways we can acquire data. Module 5, we talked about anti-forensics. So what are the bad people doing to try to prevent us as investigators from getting the information we need? Module 6 was operating system forensics. We talked about Windows, Mac, and Linux. Module 7, we talked about network forensics and some of the legal challenges…

Contents