CYB 610 Project 6 Workspace Exercise

Size: px
Start display at page:

Download "CYB 610 Project 6 Workspace Exercise"

Transcription

1 CYB 610 Project 6 Workspace Exercise I. Digital Forensics Lab (Introduction to FTK Imager) a. Lab Rules: Each student has to do the lab individually. No content directly quoted from Internet or other sources is allowed Include your results in your deliverables. b. Lab Objectives: To familiarize the student with the use of forensic tools such as FTK imager in order to better understand the purpose and importance of this type of tool when performing forensic analysis. c. Competencies: Forensic analysis, Systems thinking, hands-on d. Lab Overview: The hands-on exercises for this lab will help you understand digital forensics concepts using tools such as the Forensic Tool Kit (FTK). Digital Forensics concepts are explained throughout the steps of Project 6 ELM classroom. You will use the UMUC Digital Lab environment to access the tools for this project. The lab environment has 4 VMs (Virtual Machines) available, connected as depicted in the figure below. Two of the machines run Linux OS, and two run Windows OS as follows: VM1= Linux = NIXATK01 VM2= Linux = NIXTGT01 VM3= Windows = WINATK01 (Use this system to run the FTK Imager for this project) VM4= Windows = WINTGT01 1

2 e. Important Lab Information: 1) Appendix A contains all the detailed Lab Instructions. After reading all the information in this section, use Appendix A to perform the lab exercises. 2) Familiarize yourself with the resources provided in the Lab Resources section of this document. You will find helpful open source links that help you understand the FTK tool you will use in this lab. 3) Connect to the lab environment following the connect instructions provided in your classroom (let your instructor know if you cannot locate the connect instructions). Contact lab support if you need general technical support related to your virtual lab environment and associated lab exercises. After you have successfully connected to the lab environment, proceed to next step in order to run the tools associated with this project. 4) FTK Imager (Forensics Tool Kit Imager): Use FTK Imager to create an image of a directory on your VM Follow the instructions provided for FTK Imager in Appendix A. 5) Compile your findings and incorporate what you have learned in your deliverables for this project. 2

3 II. Lab Resources Lab Credentials: User: StudentFirst Pass: Application websites Access Data: EnCase: Lab Reference Information Application documentation Access Data FTK Imager: _FTK_Imager_-_Imaging.pdf EnCase: o on%206.11%20user's%20guide.pdf o Application videos online Access Data FTK Imager: o o EnCase o o 3

4 APPENDIX A (Lab Instructions) (Return to Important Lab Information) FTK Imager (Forensic Tool Kit) Imaging a directory on your VM In this experiment, you will use FTK Imager to image a directory folder on your machine. Usually investigators will image (i.e. make a bit by bit copy) a whole drive to make a duplicate of it. In this case we only want to image a single directory folder and its contents due to time (faster) and disk space considerations. In the following example of doing imaging with FTK Imager, keep in mind that as a student, you will only select to image a disk directory, choose the directory in the tool interface options, and then select the output of that image. You could then mount the resulting image and explore its contents to verify that it was in fact a captured image of the directory you had specified. Here is an example of use of the imaging features of FTK in the video you can watch at the following Internet URL: FTK Imager Lite Tutorial and Example: FTK Imager Example: Creating an Image File: Opening an Image File: Step by step instructions: 1. On the desktop of the VM WINATK01 à Lab Resources à Applications àlocate and launch FTK Imager. 2. Once the program starts, select File -> Create Disk Image. 4

5 3. In the Select Source dialog, select Contents of a Folder. For this exercise, we are going to create a bit by bit image of a folder due to size and time constraints. Click Next. 4. Click Yes to continue. Note the information provided in the message. 5

6 5. We are going to create an image of the Sample Pictures folder located in the Public Pictures folder as shown below. Click finish 6

7 6. Check the box that says Create directory listings of all files in the image and click Add to indicate the location where the image will be stored 7. Fill out the Evidence Item Information as you wish and click Next 7

8 8. Select a destination location in the Select Image Destination dialog and click Finish. Then, click start on the Create Image dialog. The image creation starts and a dialog will follow indicating the hashes that have been created. The hashes are the values that ensure the integrity of this image. Later on, (possibly during litigation) these values can be used to prove that the image was not altered after the time of initial capture. Click Close. 8

9 9. View the Image Summary and note the information given. Click Close. 9

10 10. Your image should be found in the desktop of your VM 11. Now, we are going to read the image back into FTK Imager to verify the image is stored. In a real investigation, the above steps are performed to capture the information of a system that is being investigated. The image is usually stored in a separate storage device such as thumb drive or an external hard drive. The forensic investigator then takes the evidence and loads it into a separate system for analysis. To load your copy on FTK, click File -> Add Evidence Item 10

11 12. In the Select Source dialog, choose Contents of a Folder (i.e. where the FTK image was stored) and click Next. 11

12 13. Select the location where the FTK image was stored and click Finish. 14. As in the image below, you should see the files created by imaging process using FTK 12

13 15. For a digital forensic investigator, the next step after obtaining a forensic image of the evidence, is to analyze the evidence using other type of tools such as the main FTK tool or EnCase. This is outside the scope of this lab, however, you have learned the concepts associated with it. 13

UMUC Digital Labs. Contents

UMUC Digital Labs. Contents Contents The DigiCampus DaaS Lab Broker... 2 Using the Lab Broker to Access Lab Environments... 3 Obtaining Lab Assistance for... 6 1 The DigiCampus DaaS Lab Broker What is the DigiCampus DaaS Lab Broker?

More information

CYB 610 Project 1 Workspace Exercise

CYB 610 Project 1 Workspace Exercise CYB 610 Project 1 Workspace Exercise I. Project Overview Your deliverables for Project 1 are described below. You will submit your work at the end of Step 6 of Project 1 in your ELM classroom. 1. Non-Technical

More information

UMUC Digital Labs. Contents

UMUC Digital Labs. Contents Contents The DigiCampus DaaS Lab Broker... 2 Using the Lab Broker to Access Lab Environments... 3 Workspace Application Manager... 6 Verifying and Refreshing Installed Apps... 6 Obtaining Lab Assistance

More information

CIS Business Computer Forensics and Incident Response. Lab Protocol 03: Acquisition

CIS Business Computer Forensics and Incident Response. Lab Protocol 03: Acquisition CIS 8630 Business Computer Forensics and Incident Response Lab Protocol 03: Acquisition Purpose: Ensure every student has experienced imaging digital storage media, hashing digital media, transferring

More information

Integrated Architecture Builder, PLC-to-ControlLogix Migration Hands-On Lab

Integrated Architecture Builder, PLC-to-ControlLogix Migration Hands-On Lab Integrated Architecture Builder, PLC-to-ControlLogix Migration Hands-On Lab For support or to comment, send e-mail to iab_support@ra.rockwell.com Integrated Architecture Builder, PLC-to-ControlLogix Migration

More information

DIGITAL FORENSIC PROCEDURE. Procedure Name: Mounting an EnCase E01 Logical Image file with FTK Imager. Category: Image Mounting

DIGITAL FORENSIC PROCEDURE. Procedure Name: Mounting an EnCase E01 Logical Image file with FTK Imager. Category: Image Mounting DIGITAL FORENSIC PROCEDURE Procedure Name: Mounting an EnCase E01 Logical Image file with FTK Imager Category: Image Mounting Procedure Development Development Owner Mr. O Organization DFIR Team Document

More information

Contents Overview... 2 Part I Connecting to the VPN via Windows OS Accessing the Site with the View Client Installing...

Contents Overview... 2 Part I Connecting to the VPN via Windows OS Accessing the Site with the View Client Installing... CSEC 640 Lab Access Contents Overview... 2 Part I Connecting to the VPN via Windows OS... 2 Accessing the Site with the View Client... 2 Installing... 3 Launching Your Client... 4 Part II Windows Access

More information

AccessData FTK Quick Installation Guide

AccessData FTK Quick Installation Guide AccessData FTK Quick Installation Guide Document date: February 11, 2015 2015 AccessData Group, Inc. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval

More information

24) Type a note then click the OK button to save the note. This is a good way to keep notes on items of interest.

24) Type a note then click the OK button to save the note. This is a good way to keep notes on items of interest. 23) Click File Analysis Tab - This allows forensic investigators to look for files on the system as they would on a regular system. Key file attributes are provided to assist the investigator (file size,

More information

Cmpt 101 Lab 1 - Outline

Cmpt 101 Lab 1 - Outline Cmpt 101 Lab 1 - Outline Instructions: Work through this outline completely once directed to by your Lab Instructor and fill in the Lab 1 Worksheet as indicated. Contents PART 1: GETTING STARTED... 2 PART

More information

Digital Forensics Validation, Performance Verification And Quality Control Checks. Crime Scene/Digital and Multimedia Division

Digital Forensics Validation, Performance Verification And Quality Control Checks. Crime Scene/Digital and Multimedia Division Validation, Performance Verification And Quality Control Checks 5. VALIDATION, PERFORMANCE VERIFICATION AND QUALITY CONTROL CHECKS 5.1. Purpose 5.1.1. The purpose of this procedure is to establish guidelines

More information

CPSC 150 Laboratory Manual. Lab 1 Introduction to Program Creation

CPSC 150 Laboratory Manual. Lab 1 Introduction to Program Creation CPSC 150 Laboratory Manual A Practical Approach to Java, jedit & WebCAT Department of Physics, Computer Science & Engineering Christopher Newport University Lab 1 Introduction to Program Creation Welcome

More information

Chapter 2. Index.dat

Chapter 2. Index.dat Chapter 2 Index.dat Internet History Practical Exercise Anatomy of a MSIE / History.IE5\Index.dat File 1. Use WinHEX to open up the file named: \Student Files\02_Internet_History\Index.dat. 2. Let s examine

More information

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Duration: 5 days You Will Learn How To Understand how perimeter defenses work Scan and attack you own networks, without actually harming

More information

VMware Horizon Client Installation Guide (Windows)

VMware Horizon Client Installation Guide (Windows) VMware Horizon Client Installation Guide (Windows) (Please note: The steps in this document must be followed exactly as shown in order to ensure a proper installation.) Requirements: You must have an existing

More information

Mission Guide: GUI Windows

Mission Guide: GUI Windows Mission Guide: GUI Windows Your Mission: Use F-Response to connect to a remote Windows machine Using F-Response to connect to a remote Windows machine and access one or more targets Step 1: Open and start

More information

LAB 1: FAMILIARITY WITH NETBEANS IDE ENVIRONMENT

LAB 1: FAMILIARITY WITH NETBEANS IDE ENVIRONMENT Statement Purpose: The purpose of this Lab. is to familiarize student with the programming environment they will be going to using throughout this course. This Lab. introduces the basics of NetBeans IDE

More information

Computer Hacking Forensic Investigator. Module X Data Acquisition and Duplication

Computer Hacking Forensic Investigator. Module X Data Acquisition and Duplication Computer Hacking Forensic Investigator Module X Data Acquisition and Duplication Scenario Allen a forensic investigator was hired by a bank to investigate employee fraud. The bank has four 30 GB machines

More information

CIS Business Computer Forensics and Incident Response. Lab Protocol 02: FileSystems/VM

CIS Business Computer Forensics and Incident Response. Lab Protocol 02: FileSystems/VM Name: CIS 8630 Business Computer Forensics and Incident Response Lab Protocol 02: FileSystems/VM Purpose: Ensure every student has experienced forensics distinctions between imaging digital storage media,

More information

Running head: FTK IMAGER 1

Running head: FTK IMAGER 1 Running head: FTK IMAGER 1 FTK Imager Jean-Raymond Ducasse CSOL-590 June 26, 2017 Thomas Plunkett FTK IMAGER 2 FTK Imager Outline Process for Adding Individual Files & Folders as Evidence Items Although

More information

Chapter 7 Forensic Duplication

Chapter 7 Forensic Duplication Chapter 7 Forensic Duplication Ed Crowley Spring 11 Topics Response Strategies Forensic Duplicates and Evidence Federal Rules of Evidence What is a Forensic Duplicate? Hard Drive Development Forensic Tool

More information

EECE.2160: ECE Application Programming Spring 2018 Programming Assignment #1: A Simple C Program Due Monday, 1/29/18, 11:59:59 PM

EECE.2160: ECE Application Programming Spring 2018 Programming Assignment #1: A Simple C Program Due Monday, 1/29/18, 11:59:59 PM Spring 2018 Programming Assignment #1: A Simple C Program Due Monday, 1/29/18, 11:59:59 PM 1. Introduction This program simply tests your ability to write, compile, execute, and submit programs using the

More information

Code::Blocks Student Manual

Code::Blocks Student Manual Code::Blocks Student Manual Lawrence Goetz, Network Administrator Yedidyah Langsam, Professor and Theodore Raphan, Distinguished Professor Dept. of Computer and Information Science Brooklyn College of

More information

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL Comp 541 Digital Logic and Computer Design Prof. Montek Singh Fall 2016 Lab #1: Getting Started Issued Wed. 8/24/16; Due Wed. 8/31/16 (11:59pm) This lab

More information

SETTING UP THE STUDENT COMPUTERS

SETTING UP THE STUDENT COMPUTERS C SETTING UP THE STUDENT COMPUTERS Understanding the System Requirements Getting the Course Virtual Machines Getting the Course Files APPENDIX C: SETTING UP THE STUDENT COMPUTERS C-1 Understanding the

More information

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL Comp 541 Digital Logic and Computer Design Spring 2016 Lab #1: Getting Started Issued Wed. 1/13/16; Due Wed. 1/20/16 (11:59pm) This lab assignment consists

More information

Mission Guide: OneDrive

Mission Guide: OneDrive Mission Guide: OneDrive Your Mission: Use F-Response to access OneDrive for Consumers Using F-Response to connect to OneDrive and collect its contents Important Note Disclaimer: F-Response provide access

More information

Lab Install Windows 8

Lab Install Windows 8 Introduction In this lab, you will install Windows 8.1 and 8.0. Recommended Equipment A computer with a blank hard disk drive Windows 8.1 and 8.0 installation DVD or USB flash drive Step 1: Starting the

More information

Incident Response Data Acquisition Guidelines for Investigation Purposes 1

Incident Response Data Acquisition Guidelines for Investigation Purposes 1 Incident Response Data Acquisition Guidelines for Investigation Purposes 1 1 Target Audience This document is aimed at general IT staff that may be in the position of being required to take action in response

More information

Source: https://articles.forensicfocus.com/2018/03/02/evidence-acquisition-using-accessdata-ftk-imager/

Source: https://articles.forensicfocus.com/2018/03/02/evidence-acquisition-using-accessdata-ftk-imager/ by Chirath De Alwis Source: https://articles.forensicfocus.com/2018/03/02/evidence-acquisition-using-accessdata-ftk-imager/ Forensic Toolkit or FTK is a computer forensics software product made by AccessData.

More information

AccessData Advanced Forensics

AccessData Advanced Forensics This advanced five-day course provides the knowledge and skills necessary to install, configure and effectively use Forensic Toolkit (FTK ), FTK Imager Password Recovery Toolkit (PRTK ) and Registry Viewer.

More information

Azure for On-Premises Administrators Practice Exercises

Azure for On-Premises Administrators Practice Exercises Azure for On-Premises Administrators Practice Exercises Overview This course includes optional practical exercises where you can try out the techniques demonstrated in the course for yourself. This guide

More information

Digital Forensics Practicum CAINE 8.0. Review and User s Guide

Digital Forensics Practicum CAINE 8.0. Review and User s Guide Digital Forensics Practicum CAINE 8.0 Review and User s Guide Ana L. Hernandez Master of Science in Cybersecurity Digital Forensics Concentration University of South Florida 12-8-2017 Table of Contents

More information

AccessData FTK Quick Installation Guide

AccessData FTK Quick Installation Guide AccessData FTK Quick Installation Guide Document date: May 20, 2014 2014 AccessData Group, Inc. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system,

More information

Microsoft Official Academic Course Windows Vista Configuration, Exam ISBN: ERRATA

Microsoft Official Academic Course Windows Vista Configuration, Exam ISBN: ERRATA Microsoft Official Academic Course Windows Vista Configuration, Exam 70-620 ISN: 978-0-470-06958-5 ERRATA Lesson Lesson 2 25 The Certification Ready? sidebar on this page does not link to an exam objective.

More information

Courseworks 9.0 Standalone Installation

Courseworks 9.0 Standalone Installation Courseworks 9.0 Standalone Installation A complete User s Guide is located on your Courseworks 9 CD (in the Paulson folder) in.pdf format. In order to fully understand how to set up your training, you

More information

GETTING STARTED FINDING VIDEOS:

GETTING STARTED FINDING VIDEOS: GETTING STARTED Tip 1: Watch Films on Demand Tutorials located on the Films on Demand Help page to become acquainted with the basics of the database. To use the database from off campus: 1) login with

More information

Ed Ferrara, MSIA, CISSP

Ed Ferrara, MSIA, CISSP MIS 5208 - Lecture 12 Investigation Methods Data Acquisition Ed Ferrara, MSIA, CISSP eferrara@temple.edu Objectives List digital evidence storage formats Explain ways to determine the best acquisition

More information

Code::Blocks Student Manual

Code::Blocks Student Manual Code::Blocks Student Manual Lawrence Goetz, Network Administrator Yedidyah Langsam, Professor and Theodore Raphan, Distinguished Professor Dept. of Computer and Information Science Brooklyn College of

More information

Hands-On Lab. Windows Azure Virtual Machine Roles. Lab version: Last updated: 12/14/2010. Page 1

Hands-On Lab. Windows Azure Virtual Machine Roles. Lab version: Last updated: 12/14/2010. Page 1 Hands-On Lab Windows Azure Virtual Machine Roles Lab version: 2.0.0 Last updated: 12/14/2010 Page 1 CONTENTS OVERVIEW... 3 EXERCISE 1: CREATING AND DEPLOYING A VIRTUAL MACHINE ROLE IN WINDOWS AZURE...

More information

Version 2.8. Installation Guide

Version 2.8. Installation Guide Version 2.8 Installation Guide Copyright 2010 Pearson Education, Inc. or its affiliate(s). All rights reserved. ELLIS is a registered trademark, in the U.S. and/or other countries, of Pearson Education,

More information

Microsoft Windows PowerShell v2 For Administrators

Microsoft Windows PowerShell v2 For Administrators Microsoft Windows PowerShell v2 For Administrators Course 50414 5 Days Instructor-led, Hands-on Introduction This four-day instructor-led course provides students with the knowledge and skills to leverage

More information

User Tutorial. Uploading Evidence: STARTALK LFO Conference Edition

User Tutorial. Uploading Evidence: STARTALK LFO Conference Edition User Tutorial Uploading Evidence: STARTALK LFO Conference Edition 2 Student Tutorial: Uploading Evidence to STARTALK LinguaFolio Online Conference Edition This tutorial provides users with the information

More information

Nested Home Lab Setting up Shared Storage

Nested Home Lab Setting up Shared Storage Nested Home Lab Setting up Shared Storage Andy Fox VCI VCAP-DCA VCP3 VCP4 Over the years teaching vsphere, several peers, colleagues and students have asked me how I setup shared storage in my nested test

More information

Getting Started with Android Development Zebra Android Link-OS SDK Android Studio

Getting Started with Android Development Zebra Android Link-OS SDK Android Studio Getting Started with Android Development Zebra Android Link-OS SDK Android Studio Overview This Application Note describes the end-to-end process of designing, packaging, deploying and running an Android

More information

FTK Imager 2.9 Release Notes

FTK Imager 2.9 Release Notes FTK Imager 2.9 Release Notes These release notes apply to AccessData FTK Imager 2.9 IMPORTANT INFORMATION If the machine running imager has an active internet connection and you are viewing HTML from the

More information

Storing Your Exercise Files

Storing Your Exercise Files Storing Your Exercise Files This appendix contains an overview for using this book with various file storage media, such as a USB flash drive or hard drive. Detailed instructions for downloading and unzipping

More information

Windows Forensics Advanced

Windows Forensics Advanced Windows Forensics Advanced Index: CF102 Description Windows Forensics - Advanced is the next step for forensics specialists, diving deeper into diverse processes on Windows OS serving computer investigators.

More information

Technology for ESOL Part 1: Computer Basics and Operating System

Technology for ESOL Part 1: Computer Basics and Operating System Technology for ESOL Part 1: Computer Basics and Operating System Use these handouts while you go through the self-paced presentation. If you need help ask the Language Lab staff to assist you. Use the

More information

Eclipse Environment Setup

Eclipse Environment Setup Eclipse Environment Setup Adapted from a document from Jeffrey Miller and the CS201 team by Shiyuan Sheng. Introduction This lab document will go over the steps to install and set up Eclipse, which is

More information

Multiple Disk VM Provisioning

Multiple Disk VM Provisioning This chapter contains the following sections: About, page 1 Workflow for, page 2 About Templates with Multiple Disks, page 2 Assigning Disk Categories, page 2 Defining Storage Policies, page 3 Creating

More information

Installation Guide - Mac

Installation Guide - Mac Kony Visualizer Enterprise Installation Guide - Mac Release 7.3 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and the document version stated

More information

IA L17 Auto Image Replication, a hands-on experience Hands-On Lab

IA L17 Auto Image Replication, a hands-on experience Hands-On Lab IA L17 Auto Image Replication, a hands-on experience Hands-On Lab Description Get hands on with Storage Lifecycle Policies Auto Image Replication in this session, which includes several different scenarios

More information

Once you have entered your Google and password, you can click the Sign In button to continue.

Once you have entered your Google  and password, you can click the Sign In button to continue. Slide 1 Welcome to the Creating and Uploading with Google Docs Tutorial. Google Docs allows you to create documents, spreadsheets, presentations, draw pictures, create forms, and much more directly within

More information

Azure 209x Practical Exercises Overview

Azure 209x Practical Exercises Overview Azure 209x Practical Exercises Overview This course includes optional exercises where you can try out the techniques demonstrated in the course for yourself. This guide lists the steps for the individual

More information

Labtainer Student Guide

Labtainer Student Guide Labtainer Student Guide January 18, 2018 1 Introduction This manual is intended for use by students performing labs with Labtainers. Labtainers assume you have a Linux system, e.g., a virtual machine.

More information

FS Future Series Quick Start Guide

FS Future Series Quick Start Guide FS Future Series Quick Start Guide Please read the following instructions for installation and activation of your Visualizer 3D software! 1. License agreement and limited warranty Read carefully all terms

More information

APPENDIX. Using Google Sites. After you read this appendix, you will be able to:

APPENDIX. Using Google Sites. After you read this appendix, you will be able to: APPENDIX B Using Google Sites Objectives After you read this appendix, you will be able to: 1. Create a New Site 2. Manage Your Sites 3. Collaborate on a Shared Site The following Hands-On Exercises will

More information

IBM Cloud Client Technical Engagement Education Network Columbus, Ohio

IBM Cloud Client Technical Engagement Education Network Columbus, Ohio IBM Cloud Client Technical Engagement Education Network Columbus, Ohio In order to access the lab environment you need to install a VPN client. Please follow these instructions to install the Connect Tunnel

More information

VMWARE HORIZON CLIENT OFF CAMPUS TUTORIAL. Software Installed: What is VMware Horizon Client? In This Manual

VMWARE HORIZON CLIENT OFF CAMPUS TUTORIAL. Software Installed: What is VMware Horizon Client? In This Manual VMWARE HORIZON CLIENT OFF CAMPUS TUTORIAL Revised May 2017 What is VMware Horizon Client? VMware Horizon Client for Windows operating systems allows you to connect to our department VMware Horizon View

More information

How to Use Audacity to Create MP3s

How to Use Audacity to Create MP3s Hello, everyone, and welcome to this short video on how to use Audacity to create MP3 files for your EWC advice templates. Why create digital audio for students? 1. Title screen. David on PIP. 2. White

More information

Overview: Requirements:

Overview: Requirements: ONENOTE PROJECT DUE BEFORE CLASS BEGINS THE WEEK OF Overview: FEBRUARY 11, 2008 One of the main skills we want CIS 150 students to take away from this class is the ability to adapt to and be able to work

More information

Mission Guide: Dropbox

Mission Guide: Dropbox Mission Guide: Dropbox Your Mission: Use F-Response to collect Dropbox account data Using F-Response to collect Dropbox Cloud Storage contents Important Note Disclaimer: F-Response provides access to 3rd

More information

Dynamic Multi-Pathing for VMware 6.0 Hands-On Lab

Dynamic Multi-Pathing for VMware 6.0 Hands-On Lab Dynamic Multi-Pathing for VMware 6.0 Hands-On Lab Description Dive into the VMware environment and explore the benefits of Dynamic Multi-Pathing for VMware. In this lab you'll learn how to increase visibility,

More information

Introduction to Ardora

Introduction to Ardora Ardora is an authoring software focused mainly on the development of educational content for the Web. Its main purpose is that teachers focus their efforts on the methodological and didactic aspects of

More information

Downloading, Installing, and Configuring Blackboard Drive

Downloading, Installing, and Configuring Blackboard Drive M06-Downloading, Installing, and Configuring Blackboard Drive Blackboard Learn: Moving Content This handout contains the exact same information as the corresponding Blackboard Learn Moving Content videos

More information

NetBackup 7.6 Replication Director A Hands On Experience

NetBackup 7.6 Replication Director A Hands On Experience NetBackup 7.6 Replication Director A Hands On Experience Description Through this hands on lab you can test drive Replication Director and experience for yourself this easy to use, powerful feature. Once

More information

Web Design Course Syllabus and Course Outline

Web Design Course Syllabus and Course Outline Web Design Course Syllabus and Course Outline COURSE OVERVIEW AND GOALS In today's world, web pages are the most common medium for sharing ideas and information. Learning to design websites is an incredibly

More information

Windows Core Forensics Forensic Toolkit / Password Recovery Toolkit /

Windows Core Forensics Forensic Toolkit / Password Recovery Toolkit / The Windows Forensics Core Training follows up the AccessData BootCamp training. This advanced AccessData training class provides the knowledge and skills necessary to use AccessData products to conduct

More information

Courseworks 8.0 Standalone Installation

Courseworks 8.0 Standalone Installation Courseworks 8.0 Standalone Installation A complete User s Guide is located on your Courseworks 8.0 CD (in the Paulson folder) in.pdf format. In order to fully understand how to set up your training, you

More information

mce100+ getting started guide Install mce100+ The disc will run and display the below screen: Choose Install mce to continue

mce100+ getting started guide Install mce100+ The disc will run and display the below screen: Choose Install mce to continue content between two the phonebook records of a content from a 1. Insert the mce CD. 2. Choose the Run mce Setup button. The disc will run and display the below screen: Choose mce to continue 5. Ready to

More information

SPECCHIO uses a Client-Server architecture. This User Guide details operation of the Client component of SPECCHIO only.

SPECCHIO uses a Client-Server architecture. This User Guide details operation of the Client component of SPECCHIO only. Version: 3.1.0 Date: 07.03.2014 Status: Approved Authors: P. Roberts & N. Sheppard (Intersect), A. Hueni (UZH) File: Pages: 7 Classification: Distribution: SPECCHIO Users Version 3.1.0 / 07.03.2014 Page

More information

WA2684 Developing MicroServices. Classroom Setup Guide. Web Age Solutions Inc.

WA2684 Developing MicroServices. Classroom Setup Guide. Web Age Solutions Inc. WA2684 Developing MicroServices Classroom Setup Guide Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2 - Minimum Software Requirements...3 Part 3 - Software

More information

As CCS starts up, a splash screen similar to one shown below will appear.

As CCS starts up, a splash screen similar to one shown below will appear. APPENDIX A. CODE COMPOSER STUDIO (CCS) v5.1: A BRIEF TUTORIAL FOR THE OMAP-L138 A.1 Introduction Code Composer Studio (CCS) is Texas Instruments integrated development environment (IDE) for developing

More information

This will be a paragraph about me. It might include my hobbies, where I grew up, etc.

This will be a paragraph about me. It might include my hobbies, where I grew up, etc. Module 3 In-Class Exercise: Creating a Simple HTML Page Name: Overview We are going to develop our web-pages the old-fashioned way. We will build them by hand. Even if you eventually decide to use WYSIWYG

More information

1) Use either Chrome of Firefox to access the VMware vsphere web Client. FireFox

1) Use either Chrome of Firefox to access the VMware vsphere web Client.   FireFox CIS 231 Windows 7 Install Lab #2 1) Use either Chrome of Firefox to access the VMware vsphere web Client. https://vweb.bristolcc.edu CHROME At the your connection is not private message, click Advanced

More information

Part I. Introduction to Linux

Part I. Introduction to Linux Part I Introduction to Linux 7 Chapter 1 Linux operating system Goal-of-the-Day Familiarisation with basic Linux commands and creation of data plots. 1.1 What is Linux? All astronomical data processing

More information

WA1804 WebSphere Enterprise Service Bus v6.2 Administration. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc.

WA1804 WebSphere Enterprise Service Bus v6.2 Administration. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. WA1804 WebSphere Enterprise Service Bus v6.2 Administration Classroom Setup Guide Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2 - Minimum Software Requirements...4

More information

FACILITY REQUIREMENTS GUIDE VMware Virtual Data Center (VDC/vClass) Cloud Lab Environment Revision 18 Feb 24th, 2017

FACILITY REQUIREMENTS GUIDE VMware Virtual Data Center (VDC/vClass) Cloud Lab Environment Revision 18 Feb 24th, 2017 FACILITY REQUIREMENTS GUIDE VMware Virtual Data Center (VDC/vClass) Cloud Lab Environment Revision 18 Feb 24th, 2017 This document identifies the classroom, equipment, and networking requirements necessary

More information

WA2451 DevOps Fundamentals. Classroom Setup Guide. Web Age Solutions Inc.

WA2451 DevOps Fundamentals. Classroom Setup Guide. Web Age Solutions Inc. WA2451 DevOps Fundamentals Classroom Setup Guide Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2 - Minimum Software Requirements...3 Part 3 - Software...4 Part

More information

LiveNX Upgrade Guide from v5.1.2 to v Windows

LiveNX Upgrade Guide from v5.1.2 to v Windows LIVEACTION, INC. LiveNX Upgrade Guide from v5.1.2 to v5.1.3 - Windows UPGRADE LiveAction, Inc. 3500 Copyright WEST BAYSHORE 2016 LiveAction, ROAD Inc. All rights reserved. LiveAction, LiveNX, LiveUX, the

More information

How to install the software of ZNS8022

How to install the software of ZNS8022 How to install the software of ZNS8022 1. Please connect ZNS8022 to your PC after finished assembly. 2. Insert Installation CD to your CD-ROM drive and initiate the auto-run program. The wizard will run

More information

PTC Technical Specialists E-Newsletter Date: June 2008

PTC Technical Specialists E-Newsletter Date: June 2008 PTC Technical Specialists E-Newsletter Date: June 2008 PTC Product Focus: A) What s New in Assembly Mode for Wildfire 4.0 Tips of the Month: B) What s New in Windchill 9.0 Replication A) Great New Wildfire

More information

How to Use This Lab Manual

How to Use This Lab Manual 3 Contents How to Use This Lab Manual........................................ 5 Lab 1: Setting Up the Student System.................................. 7 Lab 2: Installing Fedora............................................

More information

School Installation Guide ELLIS Academic 5.2.6

School Installation Guide ELLIS Academic 5.2.6 ELLIS Academic 5.2.6 This document was last updated on 2/16/11. or one or more of its direct or indirect affiliates. All rights reserved. ELLIS is a registered trademark, in the U.S. and/or other countries,

More information

Install and Manage Windows Nano Server 2016 Step by Step

Install and Manage Windows Nano Server 2016 Step by Step Complete Lab (V2.0) Ahmed Abdelwahed Microsoft Certified Trainer Ahmed_abdulwahed@outlook.com Table of Contents Lab Objective... 3 Windows Nano Server 2016 overview... 3 Current infrastructure environment...

More information

EUSurvey OSS Installation Guide

EUSurvey OSS Installation Guide Prerequisites... 2 Tools... 2 Java 7 SDK... 2 MySQL 5.6 DB and Client (Workbench)... 4 Tomcat 7... 8 Spring Tool Suite... 11 Knowledge... 12 Control System Services... 12 Prepare the Database... 14 Create

More information

APPENDIX A. CODE COMPOSER STUDIO (CCS) v5: A BRIEF TUTORIAL FOR THE DSK6713

APPENDIX A. CODE COMPOSER STUDIO (CCS) v5: A BRIEF TUTORIAL FOR THE DSK6713 APPENDIX A. CODE COMPOSER STUDIO (CCS) v5: A BRIEF TUTORIAL FOR THE DSK6713 A.1 Introduction Code Composer Studio (CCS) is Texas Instruments integrated development environment (IDE) for developing routines

More information

VDI Users Guide. Mac OS X

VDI Users Guide. Mac OS X Mac OS X VDI Users Guide NOTICE: Access to electronic resources at Moraine Park Technical College is restricted to employees, students, or other individuals authorized by the College. By connecting to

More information

Chapter 7 Forensic Duplication

Chapter 7 Forensic Duplication Chapter 7 Forensic Duplication Ed Crowley Spring 10 Topics Response Strategies Forensic Duplicates and Evidence Federal Rules of Evidence What is a Forensic Duplicate? Hard Drive Development Forensic Tool

More information

WA2592 Applied Data Science and Big Data Analytics. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc.

WA2592 Applied Data Science and Big Data Analytics. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. WA2592 Applied Data Science and Big Data Analytics Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Class Setup...3 Part 2 - Minimum Software Requirements

More information

INSTALLATION GUIDE FOR LEWAPLUS PORTABLE

INSTALLATION GUIDE FOR LEWAPLUS PORTABLE Installation Guide for LewaPlus Portable Page 1 of 8 INSTALLATION GUIDE FOR LEWAPLUS PORTABLE This document will guide you step by step through the installation of the LewaPlus Portable application. FIRST

More information

OPS235: Week 1. Installing Linux ( Lab1: Investigations 1-4)

OPS235: Week 1. Installing Linux ( Lab1: Investigations 1-4) OPS235: Week 1 Installing Linux ( Lab1: Investigations 1-4) 1 Agenda: Lab 1 Required materials Thinking Ahead (Tips / Warnings): Importance of Command Line LVM / Host vs Virtual Machines Importance of

More information

Business Connect Secure Remote Access Service (SRAS) Customer Information Package

Business Connect Secure Remote Access Service (SRAS) Customer Information Package Business Connect Secure Remote Access Service (SRAS) Customer Information Package Table of Contents 1.0 Introduction... 1 1.1 Overview... 1 1.2 Scope and Audience... 1 1.3 Design Deliverables... 1 1.4

More information

Tutorial for iumlite Creation of Sequence Diagrams and State Machine Diagrams

Tutorial for iumlite Creation of Sequence Diagrams and State Machine Diagrams Tutorial for iumlite Creation of Sequence Diagrams and State Machine Diagrams Useful Links: http://www.kc.com You can download an evaluation version of the software from here, including manuals. On the

More information

Digital Forensics Lecture 01- Disk Forensics

Digital Forensics Lecture 01- Disk Forensics Digital Forensics Lecture 01- Disk Forensics An Introduction to Akbar S. Namin Texas Tech University Spring 2017 Digital Investigations and Evidence Investigation of some type of digital device that has

More information

Tutorial NetOp School

Tutorial NetOp School Tutorial NetOp School Getting Started: NetOp is software available in the computer classrooms that allows screen sharing. That means you can show what's on your screen to all students, or that you can

More information

Computer Forensic Capabilities. Cybercrime Lab Computer Crime and Intellectual Property Section United States Department of Justice

Computer Forensic Capabilities. Cybercrime Lab Computer Crime and Intellectual Property Section United States Department of Justice Computer Forensic Capabilities Cybercrime Lab Computer Crime and Intellectual Property Section United States Department of Justice Agenda What is computer forensics? Where to find computer evidence Forensic

More information

ProDoc Tech Tip. Downloading and Installing ProDoc, Step-by-Step

ProDoc Tech Tip. Downloading and Installing ProDoc, Step-by-Step ProDoc Tech Tip Downloading and The following instructions will show you step-by-step how to download and install the student version of ProDoc. These instructions were written for the Microsoft Internet

More information

Teradata Studio and Studio Express

Teradata Studio and Studio Express Teradata Studio and Studio Express Installation Guide Release 16.20 April 2018 B035-2037-518K Copyright and Trademarks Copyright 2006-2018 by Teradata. All Rights Reserved. All copyrights and trademarks

More information