YOLO
You will need to perform a forensic analysis of a hard drive image and associated captured network traffic This is a forensic image that has been taken and is
available for you to download and examine. There is a scenario that goes along with this forensic image as well as an associated network traffic.
What you need to know/do:
Review the scenario that is provided on the web page
Gather the tools that you think will be necessary to analyze these files
There is also a UMUC cyber lab that allows you to use more traditional mainstream forensic analysis software, such as FTK and EnCase, I will be sending out the log
in instructions this week.
If you want to get a head start on this portion, send me a private message and I will send you the information.
Start your analysis, consider such things as Registry analysis, email analysis, web surfing artifacts, User account activity, malicious files, etc. There are a lot of ways
to analyze the data and many tools to assist you.
The point here is that you have been provided with two data sets, they need to be analyzed and the data correlated.
Your deliverable for this final project will be comprehensive report on your findings. A professional report.
Forensics Report
Students will analyze a forensic image provided by the instructor and then write a case report which summarizes their findings. The case report will cover the
following information:
PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET AN AMAZING DISCOUNT 🙂

+1 862 207 3288 