From the course: Cybersecurity Foundations: Computer Forensics
Unlock the full course today
Join today to access over 25,200 courses taught by industry experts.
Live acquisition case study with a commercial tool
From the course: Cybersecurity Foundations: Computer Forensics
Live acquisition case study with a commercial tool
- [Instructor] FTK Imager can serve as a live acquisition tool too. Here is how you do it. Go to file, choose capture memory. You have to specify what is your destination path. Next, click on browse. Let's make our destination folder as our desktop. Click OK, and then click on capture memory. The memory capturing process has been finished successfully. Click on close. You can see the memory dump file named memdump.mem.
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
-
(Locked)
Data acquisition approaches1m 44s
-
(Locked)
Static acquisition with open-source tools3m 39s
-
(Locked)
Static acquisition case study with dd2m 57s
-
(Locked)
Static acquisition case study with dcfldd1m 53s
-
(Locked)
Live acquisition case study with a commercial tool40s
-
(Locked)
Challenge: Live acquisition with a memory dump file29s
-
(Locked)
Solution: Live acquisition with a memory dump file47s
-
(Locked)
-
-