{"id":127,"date":"2020-08-26T20:29:02","date_gmt":"2020-08-26T20:29:02","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=127"},"modified":"2024-12-06T22:38:49","modified_gmt":"2024-12-06T22:38:49","slug":"cyse-407","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jaalencooper41\/cyse-407\/","title":{"rendered":"Skill 3: Digital Forensics"},"content":{"rendered":"\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h6 class=\"wp-block-heading\">Digital forensics is the practice of collecting, preserving, and analyzing digital evidence to investigate and respond to cyber incidents. This skill includes using forensic tools, analyzing data from various devices, and presenting findings in a clear and professional manner for technical and legal contexts.<\/h6>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jaalencooper41\/wp-content\/uploads\/sites\/20208\/2024\/12\/IT-150-lab-5.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of IT-150-lab-5.\"><\/object><a id=\"wp-block-file--media-9374db02-0b39-4c46-ae33-a5597aca3ac8\" href=\"https:\/\/sites.wp.odu.edu\/jaalencooper41\/wp-content\/uploads\/sites\/20208\/2024\/12\/IT-150-lab-5.pdf\">IT-150-lab-5<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jaalencooper41\/wp-content\/uploads\/sites\/20208\/2024\/12\/IT-150-lab-5.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-9374db02-0b39-4c46-ae33-a5597aca3ac8\">Download<\/a><\/div>\n\n\n\n<ul>\n<li>In CYSE 407, I utilized Cengage to gain a comprehensive understanding of digital forensics and apply that knowledge through hands-on labs. These labs provided my first experience working with Windows systems and the Command Line Interface (CLI), allowing me to develop foundational skills in forensic analysis.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jaalencooper41\/wp-content\/uploads\/sites\/20208\/2024\/12\/artifact-2-skill-3.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of artifact-2-skill-3.\"><\/object><a id=\"wp-block-file--media-f7843deb-992c-4018-8437-c3418acb00fc\" href=\"https:\/\/sites.wp.odu.edu\/jaalencooper41\/wp-content\/uploads\/sites\/20208\/2024\/12\/artifact-2-skill-3.pdf\">artifact-2-skill-3<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jaalencooper41\/wp-content\/uploads\/sites\/20208\/2024\/12\/artifact-2-skill-3.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-f7843deb-992c-4018-8437-c3418acb00fc\">Download<\/a><\/div>\n\n\n\n<ul>\n<li>In this lab, we practiced techniques used in digital forensics to access and analyze critical information within a virtual machine environment. Using tools like Wireshark and others, we identified and examined network traffic to uncover a specific flag, demonstrating our ability to extract essential data required to complete the assignment.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jaalencooper41\/wp-content\/uploads\/sites\/20208\/2024\/12\/artifact-3-skill-3.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of artifact-3-skill-3.\"><\/object><a id=\"wp-block-file--media-f6483512-5e5a-4937-a7d7-c8545f2af18b\" href=\"https:\/\/sites.wp.odu.edu\/jaalencooper41\/wp-content\/uploads\/sites\/20208\/2024\/12\/artifact-3-skill-3.pdf\">artifact-3-skill-3<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jaalencooper41\/wp-content\/uploads\/sites\/20208\/2024\/12\/artifact-3-skill-3.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-f6483512-5e5a-4937-a7d7-c8545f2af18b\">Download<\/a><\/div>\n\n\n\n<ul>\n<li>I participated in a lab exercise focused on analyzing emails to uncover hidden information, such as metadata, attachments, and embedded links, which could reveal critical evidence in a cybersecurity investigation. Using forensic tools, I examined email headers to trace the sender&#8217;s IP address, verify the authenticity of the message, and identify potential phishing attempts or malicious content.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Digital forensics is the practice of collecting, preserving, and analyzing digital evidence to investigate and respond to cyber incidents. This skill includes using forensic tools, analyzing data from various devices, and presenting findings in a clear and professional manner for technical and legal contexts.<\/p>\n","protected":false},"author":17916,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jaalencooper41\/wp-json\/wp\/v2\/pages\/127"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jaalencooper41\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jaalencooper41\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaalencooper41\/wp-json\/wp\/v2\/users\/17916"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaalencooper41\/wp-json\/wp\/v2\/comments?post=127"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/jaalencooper41\/wp-json\/wp\/v2\/pages\/127\/revisions"}],"predecessor-version":[{"id":341,"href":"https:\/\/sites.wp.odu.edu\/jaalencooper41\/wp-json\/wp\/v2\/pages\/127\/revisions\/341"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jaalencooper41\/wp-json\/wp\/v2\/media?parent=127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}