Search Results "Digital Forensics"

Screenshot of forensic lab policy
Digital Forensics Policies and Documents

Trusted Source, Tested Policies For nearly 20-years, we have been writing policies, procedures, and forms for digital forensic labs across…

DF Lab Policy - Storage of Digital Evidence and Forensic Images
Digital Forensic Lab Policy – Storage of Digital Evidence and Forensic Images

This customizable Word document is a policy for digital forensic labs to outline how digital evidence is to be stored and retained by the digital forensics laboratory.

Teachable Course Image - Desktop
Creating a Digital Forensic Capability Course

Whether you are just getting started in digital forensics or have been operating for a while, this course is designed for anyone who is managing digital forensic laboratories or operations. At the completion of this course, students will receive a certificate and 3 hours of continuing education.

Natsar Products

Let us help on your journey… Accelerate your progress by using Natsar’s trusted training, policies, templates, and documents. Show Filters…

Natsar logo
Home Page

Providing expert training in cybersecurity, digital forensics, risk management, technology, and leadership. Stay Connected Affordable Trusted Training by Experienced Instructors…

Natsar logo
About Natsar

Located in NEW YORK’S CAPITAL REGION, AND Serving the WORLD Headquartered in the Capital Region of New York just outside…

Screenshot of Post Mortem Analysis Checklist - Windows
Post Mortem Analysis Checklist – Windows

Checklist for digital forensic analysts to use while performing forensics on a Windows-based system.

screenshot of chrome database
How DNS Prefetching and Preloading Can Lead to Incorrect Conclusions

Coding used by web developers to improve the user experience (UX) of web browsing can cause data to be stored within a user’s device without the knowledge or interaction of the user. An untrained digital forensic analyst or a person reviewing the results of a forensic analysis that lacks proper context may make incorrect assumptions about a user’s activities.