Do you need help any Digital Forensic/CyberSecurity research?

I see a lot of questions on Twitter, email listserves, Google+ etc about technical challenges Digital Forensic/Incident Responders are dealing with on a daily basis. I know that we’re all very busy at our jobs and sometimes we just don’t have time to conduct research into a particular project. I would like to offer a solution – a class of eager undergraduate …

Engage Digital Forensic / Incident Response Students. Why is this a good idea?

In the ever growing field of digital forensics / incident response there is a great need for professionals to mentor/assist those currently trying to break into the industry. Some of you reading this are literally the “rock stars” of DFIR community – and students know this. We all have mentors and people that we aspire to be like. In the above video, …

Jonathan Rajewski to speak at the University of New Hampshire at Manchester

I’ve been asked to give a presentation at the University of New Hampshire at Manchester on November 1, 2012. Here is a link to the program. Below is a description of what I will be presenting on. Computing Showcase in Digital Forensics Event Details Public ProgramDate: November 1, 2012Time: 6:00 pm – 8:00 pmVenue: Third floor auditorium Learn about current …

Operating System Forensics – Week 1 Overview

The first week of classes went well for this course. One of the questions I love ask students after I go over the course schedule is “what would they like me to present on in addition to what I planned?”. The overwhelming response from students (mostly junior / senior –  Computer Forensic / Computer Networking and Security) was Malware Analysis. Typically I …

Series Introduction: Operating System Forensics

This is the first post for the 2012 Fall Operating System Forensics course at Champlain College. This course is focused on teaching students how to extract and analyze information from some of the most commonly seen operating systems. We will explore aspects from basic analysis all the way through some of the most leading edge analysis methodologies that will help …

Series Introduction: Mobile Device Forensics

This is the introduction post for my Fall 2012 Mobile Device Forensics course. This is a brand new course and will be actively developed over the semester. During this course students will learn about cell phone / mobile device / embedded system technologies. Over the next 15 weeks we will delve into everything from how cell phones and their respective networks work, how information is stored on mobile devices, how …

Jonathan Rajewski to speak at Sugarbush Resort

Cybersecurity is becoming the Number 1 concern for General Counsels and Directors. (Law.com) On Thursday, September 27, 2012 I will be speaking at the Sugarbush Resort on the topic of Cybersecurity. Here is a link to the program on Champlain College’s website. Click here for the PDF. Below is a visual of the agenda. After the presentation I will post up slides/content.

GPT partitioning scheme resource

Finding the right information when you’re looking for it sometimes takes a while. I wanted to share with you some information that I quickly put together on the GPT partitioning scheme. While doing some course development work for a graduate couse titled “Operating System Analysis“and I wanted to locate a current resource on the GPT partitioning scheme. Of course we …

Computer & Digital Forensic Failures

Why would one want to study digital forensic failures? The same reason one practices what to do in a sporting game situation – so they’re prepared for the real game. A related reason is when a Football player watches game tape – they can learn from their and others mistakes. Lawyers conduct mock trials etc… This blog post will be …

Jonathan Rajewski – Computer & Digital Forensic Professor – Recognized as one of the nations "Best 300 Professors" by The Princeton Review

“It’s all about the students” – This was my answer to the question “Why do you teach?” posed to me few weeks ago by an industry professional. Preparing students for their future careers in the digital forensic / incident response / cyber security industries is something that I really enjoy. It’s also one ways I can contribute to the cyber security / computer forensic …