Exploiting FTK Imager

Exploiting FTK Imager

Tips, Tricks, Workflows, and Knowledge About one of the Most Widely Used Forensic Applications

About this course

FTK Imager is one of the most widely used and freely available forensics applications ever developed.  This amazing software has been noted in forensic books, journals, papers, courses, classes, and conferences, yet, training specific to the tool has only existed recently.  Although intuitive, it is an important aspect of maintaining credible and documented experience by taking formal training in any forensic tool.

Exploiting FTK Imager gives documented proof of training in FTK Imager that will benefit the user in its use as well as give documentation of exposure and testing of appropriate and reasonable use of FTK Imager.

Curriculum

  • Introduction
  • FTK Imager - Knowledge!
  • Getting to Know FTK Imager
  • Set up and Run FTK Imager!
  • FTK Imager Interface
  • A few more menu commands!
  • Working with Evidence
  • Adding Evidence to FTK Imager
  • Create a Disk Image with FTK Imager
  • Create a Custom Content Image with FTK Imager (AD file)
  • Capturing Memory
  • Mounting Images
  • Mounting Images with FTK Imager
  • Obtaining Registry Files
  • Obtaining Registry Files (Protected Files)
  • Encryption
  • FTK Imager Encryption and Decryption
  • Exporting Files
  • Export Files from FTK Imager
  • Employing FTK Imager via Commandline
  • Troubleshooting
  • Workflow Scenarios, Closing Thoughts
  • Testing
  • Test Information
  • The questions!
  • Downloads
  • FTK Imager Applications
  • Legal cases where FTK Imager has been noted
  • Publicly Available Testing of FTK Imager

About this course

FTK Imager is one of the most widely used and freely available forensics applications ever developed.  This amazing software has been noted in forensic books, journals, papers, courses, classes, and conferences, yet, training specific to the tool has only existed recently.  Although intuitive, it is an important aspect of maintaining credible and documented experience by taking formal training in any forensic tool.

Exploiting FTK Imager gives documented proof of training in FTK Imager that will benefit the user in its use as well as give documentation of exposure and testing of appropriate and reasonable use of FTK Imager.

Curriculum

  • Introduction
  • FTK Imager - Knowledge!
  • Getting to Know FTK Imager
  • Set up and Run FTK Imager!
  • FTK Imager Interface
  • A few more menu commands!
  • Working with Evidence
  • Adding Evidence to FTK Imager
  • Create a Disk Image with FTK Imager
  • Create a Custom Content Image with FTK Imager (AD file)
  • Capturing Memory
  • Mounting Images
  • Mounting Images with FTK Imager
  • Obtaining Registry Files
  • Obtaining Registry Files (Protected Files)
  • Encryption
  • FTK Imager Encryption and Decryption
  • Exporting Files
  • Export Files from FTK Imager
  • Employing FTK Imager via Commandline
  • Troubleshooting
  • Workflow Scenarios, Closing Thoughts
  • Testing
  • Test Information
  • The questions!
  • Downloads
  • FTK Imager Applications
  • Legal cases where FTK Imager has been noted
  • Publicly Available Testing of FTK Imager