You are on page 1of 2

COEN 152/252: Computer Forensics, Winter 2014 Study Guide for Final

Everything from Midterm 1 and Midterm 2 lectures Labs Homeworks Additional Topics: Antiforensics Malware From Textbook:
Chapter 11: Virtual Machines, N...

423Page 423 424Virtual Machines Overview 428Network Forensics Overview 430Performing Live Acquisitions 432Developing Standard Procedures for Net... 434Using Network Tools 444Chapter Summary

Chapter 12: E-mail Investigatio...

451Page 451 452Exploring the Role of E-mail in Invest... 453Exploring the Roles of the Client and ... 454Investigating E-mail Crimes and Violat... 467Understanding E-mail Servers 473Using Specialized E-mail Forensics Too...

Chapter 13: Cell Phone and Mobi...

495Page 495 496Understanding Mobile Device Forensics 501Understanding Acquisition Procedures f...

Chapter 14: Report Writing for ...

515Page 515 516Understanding the Importance of Report... 519Guidelines for Writing Reports 527Generating Report Findings with

Chapter 15: Expert Testimony in...

541Page 541 542Preparing for Testimony 546Testifying in Court 554Preparing for a Deposition or Hearing 557Preparing Forensics Evidence for Tes

Chapter 16: Ethics for the Expe...

575Page 575 576Applying Ethics and Codes to Expert Wi... 580Organizations with Codes of Ethics - skim 585Ethical Difficulties in Expert Testimo... 587An Ethics Exercise

You might also like