Part of the Information Technology degree required that I had taken two courses that both had a focus on Computer Forensics. These courses were "Computer Forensics" and "Survey of Information Security, Internet Fraud, and Computer Forensics." While taking these classes it built and utilized my knowledge of using real forensics programs that are relevant to the computer forensics field. It displays my abilities to sift through local files, run files through these applications, and take the information to identify encrypting and important information that can only be accessed via using the application correctly.
To the left is one of the applications I used called "Access Data FTK Imager," which is used to recover information that can be found on any disc, while also supplying copies that are identical to the original information.
This program is an open source USB encryption tool that is used to add encryption on both internal and external drives. It also works with system partitions as well as ISO images.
This is an application that was created by Access Point to work exclusively for Computer Forensics. Its purpose is to scan hard drives of computers to extract information, including information that was deleted on the computer.
This application is a tool used to quickly search through all of the files found on a computer by sectioning off the files based on file type and where they're located.
This application is a digital forensics software that is made to be used for virtually any forensics based case and situation while simplifying it for the user.