Focus
Focus areas
- Step 1
Acquire volatile and non-volatile data, perform file carving, partition/metadata inspection, and analyze application artifacts such as shellbags, USB history, prefetch, and registry traces.
- Step 2
Walk through FAT/NTFS file systems, corrupted disk recovery, and hidden data locations so every forensic acquisition is repeatable and admissible.
- Step 3
Analyze both endpoint and network evidence (logs, timelines, packet captures) before documenting findings in structured, exam-ready reports that align to the eCDFP blueprint.