From the course: Operating System Forensics
Operating system forensics
From the course: Operating System Forensics
Operating system forensics
- [Instructor] Every computing device we encounter uses its own operating system. Criminals use the intricacies of operating systems to conceal information. So it's up to you to find out where the evidence is hidden. In this course, I'll teach you the foundations of operating system forensics, including where evidence may be hidden, like deleted files, slack spaces, and alternate data streams and file systems. Hi, I'm Jungwoo Ryoo. For decades, I've been a college professor helping students develop their careers in digital forensics. So join me, and let's start our investigation.