© 2019

Digital Forensics Basics

A Practical Guide Using Windows OS


Table of contents

  1. Front Matter
    Pages i-xxii
  2. Nihad A. Hassan
    Pages 35-67
  3. Nihad A. Hassan
    Pages 69-91
  4. Nihad A. Hassan
    Pages 93-110
  5. Nihad A. Hassan
    Pages 111-139
  6. Nihad A. Hassan
    Pages 141-177
  7. Nihad A. Hassan
    Pages 179-245
  8. Nihad A. Hassan
    Pages 247-289
  9. Nihad A. Hassan
    Pages 291-310
  10. Nihad A. Hassan
    Pages 311-322
  11. Nihad A. Hassan
    Pages 323-326
  12. Back Matter
    Pages 327-335

About this book


Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner to prosecute in a court of law.

Directed toward users with no experience in the digital forensics field, this book provides guidelines and best practices when conducting investigations as well as teaching you how to use a variety of tools to investigate computer crime. You will be prepared to handle problems such as law violations, industrial espionage, and use of company resources for private use.

Digital Forensics Basics is written as a series of tutorials with each task demonstrating how to use a specific computer forensics tool or technique. Practical information is provided and users can read a task and then implement it directly on their devices. Some theoretical information is presented to define terms used in each technique and for users with varying IT skills.

What You’ll Learn:

  • Assemble computer forensics lab requirements, including workstations, tools, and more
  • Document the digital crime scene, including preparing a sample chain of custody form
  • Differentiate between law enforcement agency and corporate investigations
  • Gather intelligence using OSINT sources
  • Acquire and analyze digital evidence
  • Conduct in-depth forensic analysis of Windows operating systems covering Windows 10–specific feature forensics
  • Utilize anti-forensic techniques, including steganography, data destruction techniques, encryption, and anonymity techniques


Cybersecurity Security Digital privacy Online security Digital forensics Digital evidence Digital anti-forensics Windows security Computer forensics Cybercrime Computer anti-forensics techniques Digital espionage Computer crime investigations Computer security Secure communications Email security Online anonymity Data encryption Computer hacking

Authors and affiliations

  1. 1.New YorkUSA

About the authors

Nihad A. Hassan is an independent information security consultant, digital forensics and cybersecurity expert, online blogger, and book author. He has been actively conducting research on different areas of information security for more than a decade and has developed numerous cybersecurity education courses and technical guides. He has completed several technical security consulting engagements involving security architectures, penetration testing, computer crime investigation, and cyber open source intelligence (OSINT). Nihad has authored five books and scores of information security articles for various global publications. He also enjoys being involved in security training, education, and motivation. His current work focuses on digital forensics, anti-forensics techniques, digital privacy, and cyber OSINT. He covers different information security topics and related matters on his security blog (DarknessGate) and recently launched a dedicated site for open source intelligence resources at ( Nihad has a bachelor of science honors degree in computer science from the University of Greenwich in the United Kingdom. He can be followed on Twitter (@DarknessGate), and you can connect to him via LinkedIn (DarkenessGate).

Bibliographic information