If you need further assistance, contact the GSA. If you would like to do the exercise in your own computer the installation instructions are given in the Appendix. ![]() The tutorial has been setup for all of the exercises and the required executables are accessible through linked short-cuts on the desktop of the administrator (no password needed to logon). Open-source forensic tools will be introduced and demonstrated for each exercise. ![]() This tutorial session will cover data storage and access, bypassing filtered ports, reviewing Internet activity, and the use of steganography. The second is to demonstrate some of the mechanisms used by malicious attackers as well as forensic experts to disrupt computer networks and manipulate information access. ![]() The first is to introduce you to some of the tools and techniques used for forensic analysis. The objective of this tutorial is twofold.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |