Professional Documents
Culture Documents
Computer Forensics and Use of AI/Computers in Forensic Sciences
Computer Forensics and Use of AI/Computers in Forensic Sciences
Computer Forensics and Use of AI/Computers in Forensic Sciences
http://www.seminarsonly.com/computer%20science/computer%20forencics.php
http://en.wikipedia.org/wiki/Computer_forensics
http://www.boston-computer-forensics.com/learn/forensics_process.php
http://www.boston-computer-forensics.com/learn/forensics_faq.php
http://www.computerforensicsworld.com/
http://ezinearticles.com/?Importance-of-Computer-Forensics&id=1116636
Google for: use of ai in forensic science, use of computers in forensic science, learning computer forensics
process
Each participant will receive a licensed copy of NTI's Incident Response Software Suite, the
new Stealth tools, a computer forensics training DVD and additional support software. They
will be exposed to encryption breaking methods and password recovery. Each participant
will also receive a free copy of FireHand Ember by FireHand Technology which is a graphics
file viewer. This viewer is used in conjunction with NTI's computer forensics software tools
which are demonstrated and used during the class. To supplement the course content and NTI
training manuals each participant will also receive a copy of Computer Forensics - Incident
Response Essentials by Warren G. Kruse II and Jay G. Heiser. This training course is
recommended in the book and several of the NTI tools provided with the course are also
described and discussed in the book.
Syllabus:
Computer Forensics Course - Day 1:
Lecture on personal computer security weaknesses and related computer security risks which enhance the ability
to find computer evidence.
Lecture on computer evidence preservation and the safe seizure of computers.
Lecture and demonstration concerning the identification of computer leads and evidence using computer forensic
data sampling techniques.
Practical exercise involving data sampling to identify leads and evidence from a Windows swap file.
Practical exercise involving data sampling to identify past Internet activity on a computer hard disk drive.
Lecture and demonstration concerning file hashing using RSA's MD5 algorithm and related testimony issues in
court.
Lecture and demonstration concerning file slack including ram slack and drive slack. The lecture will focus on
security weaknesses associated with file slack and the use of file slack as a source of leads and evidence in computer-
related cases.
Lecture and demonstration concerning unallocated file space and its use as a data sampling source of leads and
evidence. The lecture will focus on security weaknesses associated with unallocated file space (erased files) and the use of
this ambient data source for leads and evidence in computer-related investigations.
Practical exercise concerning file hashing using RSA's MD5 algorithm.Practical exercise involving file slack
analysis and the forensic matching of a floppy diskette to a computer hard disk drive. This advanced technique was
developed by NTI and it is mentioned in John Vacca's book, Computer Forensics - Computer Crime Scene Investigations.
Lecture and demonstration of the computer startup process (boot process). Emphasis is placed upon the
importance of the boot process as a potential security risk and insider threat.
Practical exercise concerning the boot process. Each student will be exposed to the modification of the boot
process and the detection of such modifications after-the-fact.
Lecture and demonstration of computer forensics searches using targeted strings of text. The lecture will focus on
the strengths and limitations of traditional forensic text searches. Security reviews for classified agencies will also be
discussed and related issues will be demonstrated.
Practical exercise concerning the hypothetical investigation of the theft of classified government data.
Students will receive licensed copies of computer forensics utilities for use with DOS,
Windows, Windows 95, Windows 98, Windows NT, Windows 2000 and Windows XP-
based systems (as described in detail above).
Course Objectives:
Each participant should leave the class with a firm understanding of the following:
Any of our classes can be held at your location. If you are interested in hosting a class for greatly
reduced or possibly free tuition please feel free to contact us.
Key Benefits
Up to date instruction
Instructors are practitioners
Our one program covers both UNIX and Windows processing
Work towards CCE Certification
Learn the full range of Computer Forensics Skills
Build your Digital Forensics Toolkit
Discover proven investigative strategies
Develop the skills to track an offender on the Internet
Design an incident response strategy
Define proper evidence handling procedures
Learn how to work with law enforcement
Expect to Learn
What's Included:
On-line Exam for the first part of the Certified Computer Examiner Certification
Five Full Days of Intensive instruction and review with a master of Forensics
Hands-on Exposure to dozens of Computer Forensics tools
Warren Kruse's (Computer Forensic Services) classic "Computer Forensics" by Addison-Wesley
Custom courseware books
Duration:
5 (five) Days of instruction, mentoring and lab time, with evening labs available.
--------------------------------------------------------------------------------------------------------------------------
Any of our classes can be held at your location. If you are interested in hosting a class for greatly reduced or possibly
free tuition please feel free to contact us.
Key Benefits
Up to date instruction
Instructors are practitioners
Our one program covers both UNIX and Windows processing
Learn the full range of Computer Forensics Skills
Build your Digital Forensics Toolkit
Discover proven investigative strategies
Develop the skills to track an offender on the Internet
Design an incident response strategy
Define proper evidence handling procedures
Learn how to work with law enforcement
Expect to Learn
What's Included:
Three Full Days of Intensive instruction and review with a master of Forensics
Hands-on Exposure to dozens of Computer Forensics tools
Warren Kruse's (Computer Forensic Services) classic "Computer Forensics" by Addison-Wesley
http://www.scribd.com/doc/23228539/Seminar-Topics-for-Final-Year-Computer-Engineering(CHECKOUT)
1)How about Artificial Intelligence. Program - user interaction. Interface. How does a program learn
something? How shall program rate/judge/evaluate input from user? How can program 'interview' user to
learn new facts? can randomly generated output be rated by user, and what can be fed back. What criteria
should program use to analyze feed back.
2)Should a syntax notation and (limited) map be used? What languages can program parse, interpret or
'understand'? Can only LogLan be used? There are 5000 human languages only on Earth, all functional.
3)Human-Computer Interface and how improvements in this field could help mankind?
4)Model-Driven Development
Model-Driven Development focuses on the use of abstract descriptions — amenable to manipulation by tools
— of systems and phenomena of interest. My research focuses on building languages, tools, and techniques
for Model-Driven Development, and integrates ideas from the OMG’s family of language standards (UML,
MOF, SPEM), from the Eclipse Modelling Project, and formal methods to build rigorous languages and tools
for building different kinds of software and systems.
5)Software Engineering
Broadly speaking, I study different approaches to building software systems, including agile processes for
engineering high-integrity and enterprise systems, mathematical techniques for analysing and reasoning
about systems, novel architectural techniques (e.g., for high-integrity real-time systems), and issues
relating software engineering and security.
6)Ontologies
Ontologies model knowledge within a particular area of human learning. With appropriate explanatory
software, users should gain an understanding of the domain through the ontology’s expression of
relationships, truths and rules.
7)Hypermedia
Hypermedia systems are linked networks of multimedia material. Their navigation interfaces and their visual
appearance need to be intuitive, minimally interfere with the task being undertaken, provide interaction that
is simple in sequence, and is consistently applicable for the task and the users’ preferences.
8)Conversational Interface
Such an interface is one that offers users a more supportive experience (than a conventional graphical user-
interface) while either the user attempts to understand a principle, technique or skill, or simply needs a
“helping hand” to find knowledge. These interfaces are speech-based and applications that have them
readily impress anthropomorphic characteristics on their users.
9)Multimedia Indexing
Multimedia indexing (of speech, video or sequenced learning material) enables the hypermedia interface to
provide semantic-level navigation that is temporally independent and, instead, directly relevant to the
structure of the knowledge being conveyed.
10)Search Engines
These provide a mechanistic means of identifying potentially important information sources. They may also
be used to help in quantifying the presentation quality of sequenced learning material as well as identify the
interconnectedness of that material.
11)Knowledge Management
Knowledge Management is concerned with the creation, transmission and preservation of knowledge in an
organisation. This covers both hard and soft forms of knowledge such as knowledge encoded in systems or
documents and knowledge embodied in people or groups.
13)Virtual Teams
Virtual team working is a special case of Computer Supported Cooperative work (CSCW). Virtual teams are
flexible and functional groups of co-workers who overcome the difficulties of differences in time and
geography through creating a virtual co-presence.
17)Software Quality assurance and robustness of software, tools used, various models, error handling,
planning , process, software life cycle, automated vs. manual, agile, scrum, types of defects
http://www.asknumbers.com/QualityAssuranceandTesting.aspx
http://www.sqa.net/
http://images.google.com/images?q=software%20quality%20assurance&rls=com.microsoft:en-us:IE-
SearchBox&oe=UTF-8&sourceid=ie7&rlz=1I7RNTN_en&um=1&ie=UTF-8&sa=N&hl=en&tab=wi
http://msdn.microsoft.com/en-us/library/ms998213.aspx
search keywords: google: daily scrums testing, seminar topics software testing
Contact me at hans.schaefer@ieee.org.
Testing is the last step in the software life cycle. Time pressure is well known and increasing
because too many defects are found late and have to be repaired. This seminar shows you how to
cope with this situation. Early test planning and the use of reviews achieve a high degree of
preventive defect removal. Still, at the end you have to execute the tests, in order to measure the
final product quality. The ultimate aim, however, is that defects show up during test preparation
rather than test execution.
These seminars show you “state of best industry practice” testing. You can use the techniques
right away, and even when you use only part of the techniques, you will feel the improvement.
You also get an overview of the latest testing tools, which may help you make test work proceed
smoother and cheaper.
Finally, I am able to offer ISTQB Foundation Level seminars. See www.istqb.org for details. (In
Norwegian see www.dataforeningen.no/istqb/ ).
In seminar 1, you will learn:
The basic methods for all test design: how to test data variation, logic and data flows. You also
learn about start and exit criteria and test coverage. In the two day version, it is augmented by
discussions how to test program modules and integrate them.
This seminar is useful for ANYBODY working with testing, and, in addition, programmers.
The basic ideas of modern software testing. How you can describe testing to other involved
people.
How software testing should be organized to be as effectively as possible.
How to monitor test progress and manage testing resources and schedules.
Start and exit criteria
How to interpret test results, and be sure about your release decisions.
What kind of technology is available to increase testing efficiency and effectiveness.
How to use defect data to improve your testing and other software work processes.
How to tailor the general model to your own needs.
How to choose the right test technique, dependent on the character of the program under test.
How to cope with complex logic.
How to test object oriented programs.
How to optimize testing by statistical reliability modeling.
How to maintain automated test suites.
How to test real time embedded software
What test research is doing.
Seminar 6:
Background
The contents
o The seminar shows you what an acceptance test consists of, and how you plan
and execute it, and how you follow up your supplier during the whole
development project, not only at the end. The basis is your needs, and maybe a
product specification. You will learn how to systematically cover every important
aspect of the software with test cases. You will see how test preparation reveals
wrong, missing or unclear requirements and thus prevents problems. You learn
the basic principles of test management, i.e. you learn how to interpret error
data to predict product performance after acceptance.
Audience
This seminar focuses on the special problems encountered here and ways to deal with them.
The topics discussed here are not normally part of any testing seminars.
We hope you will be an active participant. The seminars have time for discussion and questions
and answers. We would like you to prepare questions on
What would you like to know about testing
Where do you think you should organize testing better.
There are more topics I can cover, but not part of the "standard" seminars.
Contents of the seminars
1. Introduction to testing
What is testing?
Terminology
Conflicting goals
V-model, test phases, different models
Black Box versus white box testing, reviews, static analysis as methods
9. Summary
Issues that came up
Priorities
3. Integration test
How to find and integration order
What to test, what not to test
Test case design
What to do if there is trouble
Issues with respect to change control
Coverage criteria
7. Nonfunctional testing
Testing installation, configuration, conversion and compatibility
Testing performance, stress, and volume
Testing reliability
Testing usability
Testing security
Testing other attributes
8. How to verify that changes and error corrections work - regression testing
Retesting during maintenance and after error repair
Maintaining tests
Automating tests
9. Acceptance testing
Customer supplier interaction
The process
1. The basic ideas of defect removal. Introduction, basic facts, terminology, test model
4. How to be sure the product is reliable enough - start and exit criteria for testing
6. Testware architecture and test documentation. How to keep order in your test
material. How to tailor the new IEEE 829 standard for test documentation
10. How to do risk management as well as risk and profit based testing: prioritizing
11. Test Process Improvement. The TPI model. How to introduce better testing
methods in your group
4. Discussion, Summary
Other topics not covered in the general seminar material, but possible to
include in in-house seminars
- Combining testing and inspections, how inspections can save time and budget
- Usability testing