The courses are delivered onsite or online.
Due to the nature of the illegal activity, there was
a suspicion that the data on the disk could have been removed or cleaned.
So, the scope of the work was to recover deleted files and analyze them.
In my research I had to include not only artifacts from web browsers.
Information from instant messengers, e-mails and documents could also prove important.
Having such a specific goal and the scope of the research, I could do
all the necessary tasks manually using a dozen or so different tools. However,
it would take me a very long time and would force me to spend many hours
in the process of obtaining data for analysis.
Being an active user of the BEC software, I knew that BEC had all the functions I needed.
The data collection for analysis with BEC was limited to connecting the disk and selecting the elements that interested me. After finishing the work by BEC, I received an orderly set of data that I could browse, search and sort. I love working so efficient. And what is important in the work of computer forensics, BEC allowed me to export relevant data to the format that was me needed.
The use of BEC saved me many hours of tedious work, thanks to which I could focus on the result and not on the way to it. A job with such a powerful tool as BEC will be appreciated by anyone who has experienced the hardships of working with electronic proofs and Internet artefacts.