• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Organizational Forensics

MIS 5170 - Section 002 - Larry Brandolph

Organizational Forensics

MIS 5216.701 ■ Fall 2019 ■ Paul Warner
  • HomePage
  • Syllabus
  • Assignments
    • Week 1, Week 2 & Week 3
      • Week 1: Introduction to Forensic
      • Week 2: Storage Formats, Acquisitions, Digital Evidence and Forensics Investigations
      • Week 3: Evaluate, Examine and Test Current Digital Forensics Tools
    • Week 4, Week 5 & Week 6
      • Week 4: Digital Forensics Analysis and Validation
      • Week 5: Exam 1 and Independent Challenge Projects
      • Week 6: Virtual Machine, Live Acquisitions, and Network Forensics
    • Week 7, Week 8 & Week 9
      • Week 7: Email and Social Media Investigations
      • Week 8: Mobile and Cloud Forensics
      • Week 9: Final Project Part 1
    • Week 10, Week 11 & Week 12
      • Week 10: Cloud Forensics
      • Week 11: Ethics For The Expert Witness
      • Week 12: E-Discovery
    • Week 13, Week 14 & Week 15
      • Week 13: Data Breach
      • Week 14: Final Project Submission & Presentation
  • Deadlines
  • Webex
  • Gradebook

Week 6: Virtual Machine, Live Acquisitions, and Network Forensics

Chapter Objectives

  • Live acquisitions
  • Using forensic tools for internal and external threats
  • Conducting forensics analysis on Virtual machines

PowerPoint

gcfi6e_ppt_ch10

Reading 

Chapter 10

Hands-on Project: Chapter 10

Hands-on Project 10-1

Hands-on Project 10-3

Hands-on Project 10-4

Case Project 10-3

You have acquire a forensic image of a suspect’s laptop.  After doing an examination, you discover at least one VM installed, and you think more data can be found, but you aren’t sure.  You decide to make a copy of the VM’s file and mount the VM as an external drive.  Write the best procedure for this situation

Topics and Required Reading

Investigating Live Virtual Environments –https://www.sciencedirect.com/topics/computer-science/forensic-acquisition

Live vs Dead Computer Forensic Image Acquisition – https://ijcsit.com/docs/Volume%208/vol8issue3/ijcsit2017080331.pdf

Required Viewing

Chapter 10 – VM – Live Acquisitions – and Network Forensics – https://www.youtube.com/watch?v=JVTv3JaRfjY

Capturing RAM from a live system – https://www.youtube.com/watch?v=hRmHm5jQIQo

Primary Sidebar

Weekly Discussions

  • Week 1 Discussion/Particitpation (1)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in