Sybex

Home Certification IT Administration Architecture & Design
3D Animation & CGI Internet Marketing
Print this page Share

EnCase Computer Forensics: The Official EnCE: EnCase Certified Examiner Study Guide

ISBN: 978-0-7821-4435-2
576 pages
March 2006
EnCase Computer Forensics: The Official EnCE: EnCase Certified Examiner Study Guide (0782144357) cover image

Description

  • Guidance Software's EnCase product is the premier computer forensics tool on the market, used in law enforcement labs for digital evidence collection; in commercial settings for incident response and information assurance; and by the FBI and Department of Defense to detect domestic and international threats
  • This guide prepares readers for both the CBT and practical phases of the exam that validates mastery of EnCase
  • Written by two law enforcement professionals who are computer forensics specialists and EnCase trainers
  • Includes the EnCase Legal Journal, essential for forensics investigators who need to be sure they are operating within the law and able to give expert testimony
  • The CD includes tools to help readers prepare for Phase II of the certification, which requires candidates to examine computer evidence, as well as a searchable PDF of the text
See More

Table of Contents

Foreword.

About the Authors.

Introduction.

Assessment Test.

Chapter 1. Computer Hardware.

Chapter 2. File Systems.

Chapter 3. First Response.

Chapter 4. Acquiring Digital Evidence.

Chapter 5. EnCase Concepts.

Chapter 6. EnCase Environment.

Chapter 7. Understanding, Searching for, and Bookmarking Data.

Chapter 8. File Signature Analysis and Hash Analysis.

Chapter 9. Windows Operating System Artifacts.

Chapter 10. Advanced EnCase.

Appendix A. Creating Paperless Reports.

Glossary.

Index.

See More

Author Information

Steve Bunting is a Captain with the University of Delaware Police Department, where he is responsible for computer forensics, video forensics, and investigations involving computers. He has over 30 years’ experience in law enforcement, and his background in computer forensics is extensive. He is a Certified Computer Forensics Technician (CCFT) and an EnCase Certified Examiner (EnCE). He was the recipient of the 2002 Guidance Software Certified Examiner Award of Excellence for receiving the highest test score on his certification examination. He holds a BS in Applied Professions/Business Management from Wilmington College and a Computer Applications Certificate in Network Environments from the University of Delaware. He has conducted computer forensic examinations for the University of Delaware and for numerous local, state, and federal agencies on an extreme variety of cases, including extortion, homicide, embezzlement, child exploitation, intellectual property theft, and unlawful intrusions into computer systems. He has testified in court on numerous occasions as a computer forensics expert. He has taught computer forensics for Guidance Software, makers of EnCase, and taught as a Lead Instructor at all course levels, including the Expert Series, with a particular emphasis on the “Internet and E-mail Examinations” course. He has been a presenter at several seminars and workshops, the author of numerous white papers, and maintains a website for cyber-crime and computer forensics issues: http://128.175.24.251/forensics/.

William Wei, a detective in the Monmouth County Prosecutor’s Office, has been a police officer for over 15 years and is currently employed as a detective with the Monmouth County Prosecutor’s Office Computer Crimes Unit. He holds a BA in economics and an EdM in Adult and Continuing Education from Rutgers, The State University of New Jersey. William is certified by Guidance Software as an EnCase Certified Examiner (EnCE) and by the International Association of Computer Investigative Specialists as a Certified Forensic Computer Examiner (CFCE).
William is a member of the International Association of Computer Investigative Specialists (IACIS) and High Tech Crime Investigation Association (HTCIA). William has conducted hundreds of computer-related investigations and has been qualified as an expert witness in computer forensics. He has taught computer forensics at the Computer and Enterprise Investigations Conference (CEIC) and HTCIA conferences and lectured on Internet safety throughout New Jersey.

See More

Downloads

Download TitleSizeDownload
See More

Errata

Do you think you've discovered an error in this book? Please check the list of errata below to see if we've already addressed the error. If not, please submit the error via our Errata Form. We will attempt to verify your error; if you're right, we will post a correction below.

ChapterPageDetailsDatePrint Run
See More

Learn more about