Course Descriptions

The following courses are being offered at this time:

  • Digital Camera Forensics
  • Introduction to a FRED Station and Encase
  • Introduction to GPS Forensics
  • Introduction to IPAD Forensics
  • Introduction to Legacy Device Forensics

Digital Camera Forensics

PDF brochure

The course topics include both theory and practical training in:

Locard’s Principle of Exchange, chain of custody, identifying, preserving, collecting, and analyzing digital evidence, metadata, Steganography, data carving, and using tools such as DataLifter 2 and Recover My Files with a few digital cameras and we will also collect and analyze data from SD Cards, forensics is the intersection of law and science, lastly we will demonstrate a nanny cam bear and discuss where digital evidence may be found.

We will also talk about the need for isolated forensic examination computers for use with the cameras as well as write blockers to preserve camera data.


Introduction to a FRED Station and Encase

PDF brochure

The course topics include both theory and practical training in:

Locard’s Principle of Exchange, chain of custody, identifying, preserving, collecting, and analyzing digital evidence, metadata, forensic image, SD cards, hard drives, CDs, Guidance Software Encase, creating a report, write blocker, SAN Storage Area Network, The FRED Station hardware, powering it up,


Introduction to GPS Forensics

PDF brochure

This introductory non credit continuing education course consists of two elements. The first element is practical while the other element is theoretical. The theoretical element consists of the history of GPS and a discussion of other competing systems such as Glonass and the Beidou Navigation Satellite System. We will also discuss relevant vocabulary such as routes, waypoints, trips, points of interest, and possible impairments to the accuracy of GPS data. The practical element consists of learning to use a write blocker, collecting the GPX and itn files, using GPS Babel to change file formats if necessary, and mapping the itinerary file using Tyre and Google Maps. Tools such as Blackthorn 3 and Tomtology will be discussed and printscreens of Tom Tom and Garmin GPS device captures shown.


Introduction to IPAD Forensics

PDF brochure

Here is an opportunity to learn about the vocabulary and tools used in the field of IPAD Forensics (approx. 122 million people in the U.S. had an IPAD in 2013), and why such investigative knowledge is important for both businesses and security professionals.

The course topics include theory or practical training in the following:

Locard’s Principle of Exchange, chain of custody, identifying, preserving, collecting, and analyzing digital evidence from an IPAD, collecting pictures, deleted pictures, email, documents, generating a report with hash marks of all evidence gathered, communication data warrant, faraday bag, Predecessors of the IPAD, The IPAD Mini, The 4 Generations of the IPAD, Oxygen Forensics, Cellebrite ios Forenics, Lantern 3

We will also talk about the need for isolated forensic examination computers for use with the IPAD.


Introduction to Legacy Device Forensics

PDF brochure

Here is an opportunity to learn about the vocabulary  and tools used in the field of flip top cell phone forensics, IDE Hard Drive Forensics, Pager Systems Forensics (3.5 million people in the U.S. had pagers in 2012), CD and Floppy Drive Forensics and why such investigative knowledge is important for both businesses and security professionals.

Locard’s Principle of Exchange, chain of custody, identifying, preserving, collecting, and analyzing digital evidence from a cell phone, collecting pictures, deleted pictures, email, SMS Messages, call logs, internal cell phone memory, SIM Cards, external memory, generating a report with hash marks of all evidence gathered, CALEA, communication data warrant, faraday bag, Susteen Secure View, Blackberry phone, Motorola V710 Camera Phone, Cyberbullying, Tracphone, Sexting, Video Voyeurism Act of 2004, Foreign Cell Phones, the FAT File System, RecoverMyFiles, Logic Cube, Helix V1.7, ISO Buster for CDs, Project-A-Phone.

We will also talk about the need for isolated forensic examination computers for use with the cell phones as well as write blockers to preserve cell phone data.