Skip to main content

Mobile Main Menu

  • Library Portal
    • About Library
    • Search the Library
    • A-Z Databases
    • Research Tools
    • Subject Guides
    • Browse Journals
    • AppsAnywhere
    • Accessibility Tools
  • Academic Skills
    • About Academic Skills
    • Academic Integrity
    • Academic Writing
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
    • Using the Library
  • English Language Hub
    • About English Language
    • Academic Writing in English
    • Self-Study Resources
  • Workshops
  • One-to-ones

Secondary navigation

  • Your Projects
  • Feedback to Win
  • iLearn
  • About Us
  • Office 365
  • Request It!
  • News Hub
Home

Main Menu

  • Library
    • About Library
    • Search the Library
    • A-Z Databases
    • Subject Guides
    • Research Tools
    • Browse Journals
    • AppsAnywhere
    • Accessibility Tools

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

  • Academic Skills
    • About Academic Skills
    • Academic Integrity
    • Academic Writing
    • Artificial Intelligence
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
    • Using the Library

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
  • English Language
    • About English Language
    • Academic Writing in English
    • Self-Study Resources

    Get personalised support from an Academic English Lecturer

    Book a one-to-one

    Get personalised support from an Academic English Lecturer

    Book a one-to-one

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
  • Workshops
  • One-to-Ones

Help

COM7016

Digital Forensics and Incident Management

All the reading and resources from your modules, all in one place

Reading List Category
Resource Type
Lesson

Lesson 1

Key Text eBook

Digital Forensics and Incident Response: Incident…

by Johansen, G.
Key Text eBook

Digital Forensics Explained

by Gogolin, G..
Essential Resource Website

What to Look For in a Digital Forensics…

by Bowcut, S.
Essential Resource Website

Ex-Apple engineer accused of stealing self-…

by Drenon, B.
Essential Resource Website

Certified Computer Examiner (CCE) Certification…

by International Society of Forensic Computer Examiners (ISFCE)
Essential Resource Website

Tesla says two ex-employees behind May data breach

by Kachwala, Z.
Essential Resource Website

Computer Hacking Forensic Investigator (CHFI) |…

by EC-Council
Essential Resource Website

GIAC Certified Forensic Analyst | Digital…

by GIAC Certifications
Essential Resource Website

Insider Threat Statistics for 2024: Reports,…

by Storchak, Y.
Essential Resource Website

Hackers jailed over SpyEye virus that robbed bank…

by Associated Press in Atlanta
Essential Resource Website

GIAC Certified Forensic Examiner | Cybersecurity…

by GIAC Certifications
Essential Resource Website

GIAC Incident Handler Certification | GCIH

by GIAC Certifications
Wider Reading Website

Arden University Careers

by Arden Futures

Lesson 2

Key Text eBook

Digital Forensics Explained

by Gogolin, G., ed
Key Text eBook

Digital Forensics and Incident Response: Incident…

by Johansen, G.
Essential Resource Other

NIST SP 800-61 Rev. 2 Computer Security Incident…

by Cichonski, P. et al.
Essential Resource Other

Incident Handler's Handbook

by Kral, P.
Wider Reading Other

ACPO Good Practice Guide for Digital Evidence

by Williams, J.

Lesson 3

Key Text eBook

Digital Forensics and Incident Response: Incident…

by Johansen, G.
Key Text eBook

Digital Forensics Explained

by Gogolin, G., ed
Essential Resource Other

BS ISO 22095:2020 Chain of custody — General…

by British Standards Institution
Essential Resource Other

NIST Interagency/Internal Report (NISTIR) - 8387…

by Guttman, B., White, D. R., Williams, S. and Walraven, T.
Essential Resource Other

Best Practices For Seizing Electronic Evidence v.…

by U.S. Department of Homeland Security
Essential Resource Other

ACPO Good Practice Guide for Digital Evidence

by Williams, J.
Essential Resource Other

Chain of Custody and Critical Infrastructure…

by Cybersecurity and Infrastructure Security Agency (CISA)
Wider Reading Website

The Sleuth Kit

by Carrier, B.
Wider Reading Website

Autopsy

by Carrier, B.
Wider Reading Website

FTK Forensics Toolkit - Digital Forensics…

by Exterro
Wider Reading Website

bulk-extractor | Kali Linux Tools

by Kali
Wider Reading Other

Evidence / Property Chain of Custody

by SANS® Institute
Wider Reading Website

The Volatility Framework | The Volatility…

by The Volatility Foundation
Wider Reading Other

Forensic Examination of Digital Evidence: A Guide…

by Ashcroft, J., Daniels, D. J. and Hart, S. V.
Wider Reading Website

CAINE Live USB/DVD - computer forensics digital…

by Bassetti, N.
Wider Reading Website

chrysocome.net - dd for windows

by Chrysocome
Wider Reading Website

Kali Linux | Penetration Testing and Ethical…

by Kali
Wider Reading Other

Sample Chain-of-Custody Report

by National Institute of Standards and Technology (NIST)
Wider Reading Other

Computer Forensics - We've Had an Incident,…

by Ryder, K.
Wider Reading Website

X-Ways Forensics: Integrated Computer Forensics…

by X-Ways
Wider Reading Website

SIFT Workstation | SANS Institute

by Lee, R.
Wider Reading Website

OpenText Encase Forensic

by OpenText
Wider Reading Other

PDF Guide to BSOL

by Arden University Learning Success Hub

Lesson 4

Key Text eBook

Digital Forensics Explained

by Gogolin, G., ed
Key Text eBook

Digital Forensics and Incident Response: Incident…

by Johansen, G.
Essential Resource Other

The Value of Metadata in Digital Forensics

by Alanazi, F. and Jones, A.
Essential Resource Website

Overview of FAT, HPFS, and NTFS File Systems -…

by Microsoft Learn
Essential Resource Website

Part I. File Systems | Storage Administration…

by Red Hat Documentation
Essential Resource Website

About Apple File System | Apple Developer…

by Apple Developer
Essential Resource eBook

A Practical Guide to Digital Forensics…

by Hayes, D. R.
Wider Reading eBook

Digital Evidence and Computer Crime: Forensic…

by Casey, E.
Wider Reading Other

The Use of File Timestamps in Digital Forensics

by Koen, R. and Olivier, M. S.
Wider Reading Website

Edit PDF metadata online

by Sejda
Wider Reading Article

On the role of file system metadata in digital…

by Buchholz, F. and Spafford, E.
Wider Reading Website

Get All Metadata Info Of Your Files

by Metadata2Go
Wider Reading Website

Garbage Collection – the silent enemy of data…

by DATREC2010
Wider Reading Website

ExifTool by Phil Harvey

by Harvey, P.
Wider Reading Website

ExifPro Download - A comprehensive tool to view,…

by Software Informer
Wider Reading Website

Metadata++ - free metadata manager for Windows

by Metadata++

Lesson 5

Key Text eBook

Digital Forensics Explained

by Gogolin, G., ed
Key Text eBook

Digital Forensics and Incident Response: Incident…

by Johansen, G.
Essential Resource Website

An introduction to using tcpdump at the Linux…

by Gerardi, R.
Essential Resource Website

Network traffic analysis using Wireshark

by Shakeel, I.
Essential Resource Website

How to collect network traffic logs with WireShark

by Kaspersky
Essential Resource Website

Logging and protective monitoring

by National Cyber Security Centre (NCSC)
Essential Resource Article

Packet analysis for network forensics: A…

by Sikos, L. F.
Essential Resource Article

Network Forensics: A Comprehensive Review of…

by Qureshi, S. et al.
Wider Reading Website

What is network forensics?

by Afifi-Sabet, K.
Wider Reading eBook

A Practical Guide to Digital Forensics…

by Hayes, D. R.
Wider Reading Website

Network Forensics Market Size & Share…

by Mordor Intelligence

Lesson 6

Key Text eBook

Digital Forensics and Incident Response: Incident…

by Johansen, G.
Key Text eBook

Digital Forensics Explained

by Gogolin, G., ed
Essential Resource Website

PeStudio Overview: Setup, Tutorial and Tips

by Fox, N.
Essential Resource Website

Process Monitor for Dynamic Malware Analysis

by Microsoft Learn
Essential Resource Video

Ghidra Code Analysis with Anuj Soni

by SANS Digital Forensics and Incident Response
Wider Reading Website

Dynamic Malware Analysis Sandbox - ANY.RUN

by ANY.RUN
Wider Reading Website

Malware Analysis | CrowdStrike Falcon® Threat…

by CrowdStrike
Wider Reading Website

Cuckoo Sandbox

by Cuckoo Sandbox
Wider Reading Website

What is Cuckoo? — Cuckoo Sandbox v2.0.7 Book

by Cuckoo Sandbox
Wider Reading Website

strings2

by glmcdona
Wider Reading Website

Hex-Rays - the State-of-the-art binary code…

by Hex Rays
Wider Reading Website

FLARE Obfuscated String Solver (FLOSS)

by Mandiant
Wider Reading Website

Install WinDbg - Windows drivers | Microsoft Learn

by Microsoft Learn
Wider Reading Website

Cuckoo Sandbox

by botherder
Wider Reading Website

Deep Malware Analysis - Joe Sandbox

by Joe Security
Wider Reading Website

Process Explorer - Sysinternals | Microsoft Learn

by Russinovich, M.
Wider Reading Website

Process Monitor - Sysinternals | Microsoft Learn

by Russinovich, M.
Wider Reading Website

VirusTotal - Home

by VirusTotal
Wider Reading Website

Wireshark · Go Deep

by WireShark Foundation
Wider Reading Website

PEiD

by wolfram77web
Wider Reading Website

x64dbg

by x64dbg
Wider Reading Website

REMnux: A Linux Toolkit for Malware Analysts

by Zeltser, L., Forman, C. and Kristensen, E.
Wider Reading Website

Ghidra

by National Security Agency
Wider Reading Website

pestudio | Winitor

by Ochsenmeier, M.

Lesson 7

Key Text eBook

Digital Forensics Explained

by Gogolin, G., ed
Essential Resource Article

An Empirical Analysis of Email Forensics Tools

by Ghafarian, A., Mady, A. and Park, K.
Essential Resource Other

Dictionary Attack on Wordpress: Security and…

by Kyaw, A. K., Sioquim, F. and Joseph, J.
Essential Resource Website

BrowsingHistoryView - View browsing history of…

by NirSoft
Essential Resource Website

ChromeCacheView - Cache viewer for Google Chrome…

by NirSoft
Essential Resource Website

Freeware Web Browser Tools Package

by NirSoft
Essential Resource Website

IECookiesView: Cookies viewer/manager for…

by NirSoft
Wider Reading Website

NetAnalysis® - Digital Detective

by Digital Detective
Wider Reading Website

Kali Tools | Kali Linux Tools

by Kali
Wider Reading Website

EmailAnalyzer

by keraatttin
Wider Reading Website

RFC 7208 - Sender Policy Framework (SPF) for…

by Kitterman, S.
Wider Reading Website

MailXaminer – Most Trusted Email Examiner…

by MailXaminer
Wider Reading Website

Log management solution | IT compliance tool -…

by ManageEngine
Wider Reading Website

Message Header Analyzer

by Message Header Analyzer
Wider Reading Website

Download Log Parser 2.2 from Official Microsoft…

by Microsoft
Wider Reading Website

Email Header Analyzer, RFC822 Parser - MxToolbox

by MxToolbox
Wider Reading Website

MZHistoryView: View the list of visited web sites…

by NirSoft
Wider Reading Website

Python Forensic and Log Analysis GUI

by py4n6
Wider Reading Website

DB Browser for SQLite

by sqlitebrowser
Wider Reading Website

headmail

by umair9747
Wider Reading Website

Wireshark · Go Deep

by WireShark Foundation
Wider Reading Website

Xtraxtor - #1 Email Extractor Software (Free to…

by Xtraxtor
Wider Reading Website

Autopsy: Web Artifacts

by Carrier, B.
Wider Reading Website

Scalp!/Anathema

by nanopony
Wider Reading Website

Autopsy - Digital Forensics

by Sleuth Kit Labs
Wider Reading Website

Splunk | The Key to Enterprise Resilience

by Splunk
Wider Reading Website

Elyzer

by B0lg0r0v
Wider Reading Other

Bulk Email Forensics

by Cohen, F.
Wider Reading Website

Browser History Examiner - Analyse & report…

by Foxton Forensics
Wider Reading Website

Messageheader

by Google Admin Toolbox
Wider Reading Website

Email Forensics Software – collects data other…

by Aid4Mail
Wider Reading Website

Browser History Histogram

by labcif
Wider Reading Website

Analyze my mail header

by Mailheader
Wider Reading Website

ChromePass - Chrome Browser Password Recovery for…

by NirSoft
Wider Reading Website

Volatility

by Volatility Foundation
Wider Reading Other

Web Application Incident Response and Forensics:…

by Willis, C. and Belani, R.
Wider Reading Website

WhatMail

by z0m31en7

Lesson 8

Key Text eBook

Digital Forensics Explained

by Gogolin, G., ed
Essential Resource Other

Ethics in the IT Community

by Bundschuh, A. D.
Essential Resource Website

Apple v the FBI: what's the beef

by Thielman, S.
Essential Resource Other

Information technology — Security techniques —…

by British Standards Institution
Essential Resource Website

Resources - NDPC

by Nigeria Data Protection Commission
Essential Resource Website

The Data Protection Act 2012

by Data Protection Commission
Essential Resource Website

Personal Data Protection Act 2010 – Jabatan…

by Department of Personal Data Protection
Essential Resource Website

Data Protection Act

by Postal and Telecommunications Regulatory Authority of Zimbabwe
Essential Resource Website

Digital Personal Data Protection Act 2023

by Ministry of Electronics and Information Technology
Essential Resource Website

Draft Legislation

by Ministry of Information Technology & Telecommunication
Essential Resource Website

Republic Act 10173 - Data Privacy Act of 2012

by National Privacy Commission
Essential Resource Website

Protection of Personal Information Act (POPI Act)

by POPIA
Wider Reading Other

Conformity assessment - Requirements for the…

by British Standards Institution
Wider Reading Other

Information technology — Security techniques —…

by British Standards Institution
Wider Reading Other

Information technology — Electronic discovery,…

by British Standards Institution
Wider Reading Other

Information technology — Electronic discovery,…

by British Standards Institution
Wider Reading Other

Information technology — Security techniques —…

by British Standards Institution
Wider Reading Other

Information technology — Electronic discovery,…

by British Standards Institution
Wider Reading Other

Information technology — Electronic discovery,…

by British Standards Institution
Wider Reading Other

Information technology — Security techniques —…

by British Standards Institution
Wider Reading Other

General requirements for the competence of…

by British Standards Institution
Wider Reading Website

Mutual legal assistance and extradition -…

by European Commission
Wider Reading Website

Forensic science providers: codes of practice and…

by Forensic Science Regulator
Wider Reading Website

GIAC Ethics Policy

by GIAC Certifications
Wider Reading Website

Equality Act 2010: guidance - GOV.UK

by Government Equalities Office and Equality and Human Rights Commission
Wider Reading Website

Data protection: The Data Protection Act - GOV.UK

by HM Government
Wider Reading Website

ParlInfo - Cybercrime Bill 2001

by Parliament of Australia
Wider Reading Other

PDF Guide to BSOL

by Arden University
Wider Reading Website

Electronic Communications Privacy Act of 1986 (…

by Bureau of Justice Assistance
Wider Reading Website

Code of Ethics and Standards of Professional…

by Digital Forensics Certification Board
Wider Reading Legislation

Equality Act 2010

Wider Reading Legislation

The Network and Information Systems Regulations…

Wider Reading Website

Justice Manual | 9-48.000 - Computer Fraud and…

by United States Department of Justice
Wider Reading Website

What is GDPR, the EU’s new data protection law?

by Wolford, B.
Wider Reading Website

The European Convention on Human Rights

by Council of Europe
Wider Reading Legislation

Data Protection Act 2018

Wider Reading Other

Forensic science activities: statutory code of…

by Home Office and Forensic Science Regulator
Wider Reading Legislation

Freedom of Information Act 2000

Wider Reading Website

Extraction of information from electronic devices…

by Home Office
Wider Reading Legislation

Human Rights Act 1998

Wider Reading Website

Freedom of information guidance and resources |…

by Information Commissioner's Office
Wider Reading Website

ISSA Code of Ethics

by Information Systems Security Association (ISSA)
Wider Reading Website

Joint Code of Ethics and Professional Conduct

by Institute of Professional Investigators
Wider Reading Website

Code of Ethics

by Association for Computing Machinery (ACM)
Wider Reading Legislation

Computer Misuse Act 1990

Wider Reading Legislation

Police and Criminal Evidence Act 1984

Lesson 9

Key Text eBook

Digital Forensics Explained

by Gogolin, G., ed
Key Text eBook

Digital Forensics and Incident Response: Incident…

by Johansen, G.
Key Text eBook

Digital Forensics and Investigations: People,…

by Sachowski, J.
Essential Resource Website

What Is Steganography & How Does It Work?

by Kaspersky
Essential Resource Website

Write a Forensic Report Step by Step [Examples…

by Salvation Data
Essential Resource Website

Autopsy User Documentation: Reporting

by Basis Technology
Essential Resource Other

Forensic Notebook (w/ edits) for Det. Brown

by Forensic Notes
Wider Reading Website

Fast Incidence Response

by certsocietegenerale
Wider Reading Website

Electronic Notes Designed for Court

by Forensic Notes
Wider Reading Website

How to Document Digital Forensic Investigations…

by Forensic Notes
Wider Reading Website

OSAC Lexicon | NIST

by National Institute of Standards and Technology
Wider Reading Website

Glossary - SWGDE

by Scientific Working Group on Digital Evidence

Footer

  • Library Portal
  • Academic Skills
  • English Language
  • Workshops
  • One-to-one Appointments

Footer 2

  • About Us
  • iLearn
  • News Hub
  • Support
  • Feedback To Win

Footer3

  • About Arden University
  • Cookies Policy
  • Privacy Policy
Contact Us
address icon

Arden University,
Middlemarch Park,
Coventry, CV3 4FJ, UK

email icon
  • Library@arden.ac.uk
  • AcademicSkills@arden.ac.uk
  • EnglishLanguageHub@arden.ac.uk
Arden University logo 

© 2005-2025 Arden University  | All rights reserved