IS4670: Week 3 Assignment 1 Create Data and Password Recovery Plans © ITT Educational Services Page 1 Learning Objectives and Outcomes
You will learn general process for examining and recovering data from a hard disk.
You will create a data recovery plan for future use.
You will learn how to write a procedure for recovering a password from a computer system.
Assignment Requirements
You are a computer forensics intern at AAA Computer Forensics, a small forensics investigations and data recovery firm. Today your manager receives a call from a client in the construction industry. The client reported that a disgruntled employee reformatted a hard disk that contained valuable blueprints for a current job. The computer is an ordinary laptop that was running Windows Vista. No backup is available. The client wants that data to be recovered and at the same time has requested that you create a procedure for using an appropriate password-cracking method. You have been asked to assist in the recovery of the data and to crack passwords.
Create a data recovery plan outline that lists the steps to be performed in recovering the data in their order of importance.
Create a document that lists the steps for recovering a password from a Windows Vista, Windows 7, or Linux system. The software used should be open source. You may have to research password recovery methods on the Internet to complete the assignment.
Submission Requirements
Format: Microsoft Word
Font: Arial, Size 12, Double-Space
Citation Style: Chicago Manual of Style
Length: 3-4 pages
Self-Assessment Checklist
I have researched and identified the appropriate steps for recovering data from a reformatted hard disk.
I have properly outlined each step in the data recovery process in correct order.
I have selected an appropriate password recovery method.
I have accurately documented the password recovery method.
IS4670: Week 3 Assignment 1 Create Data and Password Recovery Plans © ITT Educational Services Page 1 Learning Objectives and Outcomes
You will learn general process for examining and recovering data from a hard disk.
You will create a data recovery plan for future use.
You will learn how to write a procedure for recovering a password from a computer system.
Assignment Requirements
You are a computer forensics intern at AAA Computer Forensics, a small forensics investigations and data recovery firm. Today your manager receives a call from a client in the construction industry. The client reported that a disgruntled employee reformatted a hard disk that contained valuable blueprints for a current job. The computer is an ordinary laptop that was running Windows Vista. No backup is available. The client wants that data to be recovered and at the same time has requested that you create a procedure for using an appropriate password-cracking method. You have been asked to assist in the recovery of the data and to crack passwords.
Create a data recovery plan outline that lists the steps to be performed in recovering the data in their order of importance.
Create a document that lists the steps for recovering a password from a Windows Vista, Windows 7, or Linux system. The software used should be open source. You may have to research password recovery methods on the Internet to complete the assignment.
Submission Requirements
Format: Microsoft Word
Font: Arial, Size 12, Double-Space
Citation Style: Chicago Manual of Style
Length: 3-4 pages
Self-Assessment Checklist
I have researched and identified the appropriate steps for recovering data from a reformatted hard disk.
I have properly outlined each step in the data recovery process in correct order.
I have selected an appropriate password recovery method.
I have accurately documented the password recovery method.
IS4670: Week 3 Assignment 1 Create Data and Password Recovery Plans © ITT Educational Services Page 1 Learning Objectives and Outcomes
You will learn general process for examining and recovering data from a hard disk.
You will create a data recovery plan for future use.
You will learn how to write a procedure for recovering a password from a computer system.
Assignment Requirements
You are a computer forensics intern at AAA Computer Forensics, a small forensics investigations and data recovery firm. Today your manager receives a call from a client in the construction industry. The client reported that a disgruntled employee reformatted a hard disk that contained valuable blueprints for a current job. The computer is an ordinary laptop that was running Windows Vista. No backup is available. The client wants that data to be recovered and at the same time has requested that you create a procedure for using an appropriate password-cracking method. You have been asked to assist in the recovery of the data and to crack passwords.
Create a data recovery plan outline that lists the steps to be performed in recovering the data in their order of importance.
Create a document that lists the steps for recovering a password from a Windows Vista, Windows 7, or Linux system. The software used should be open source. You may have to research password recovery methods on the Internet to complete the assignment.
Submission Requirements
Format: Microsoft Word
Font: Arial, Size 12, Double-Space
Citation Style: Chicago Manual of Style
Length: 3-4 pages
Self-Assessment Checklist
I have researched and identified the appropriate steps for recovering data from a reformatted hard disk.
I have properly outlined each step in the data recovery process in correct order.
I have selected an appropriate password recovery method.
I have accurately documented the password recovery method.
IS4670: Week 3 Assignment 1 Create Data and Password Recovery Plans © ITT Educational Services Page 1 Learning Objectives and Outcomes
You will learn general process for examining and recovering data from a hard disk.
You will create a data recovery plan for future use.
You will learn how to write a procedure for recovering a password from a computer system.
Assignment Requirements
You are a computer forensics intern at AAA Computer Forensics, a small forensics investigations and data recovery firm. Today your manager receives a call from a client in the construction industry. The client reported that a disgruntled employee reformatted a hard disk that contained valuable blueprints for a current job. The computer is an ordinary laptop that was running Windows Vista. No backup is available. The client wants that data to be recovered and at the same time has requested that you create a procedure for using an appropriate password-cracking method. You have been asked to assist in the recovery of the data and to crack passwords.
Create a data recovery plan outline that lists the steps to be performed in recovering the data in their order of importance.
Create a document that lists the steps for recovering a password from a Windows Vista, Windows 7, or Linux system. The software used should be open source. You may have to research password recovery methods on the Internet to complete the assignment.
Submission Requirements
Format: Microsoft Word
Font: Arial, Size 12, Double-Space
Citation Style: Chicago Manual of Style
Length: 3-4 pages
Self-Assessment Checklist
I have researched and identified the appropriate steps for recovering data from a reformatted hard disk.
I have properly outlined each step in the data recovery process in correct order.
I have selected an appropriate password recovery method.
I have accurately documented the password recovery method.
IS4670: Week 3 Assignment 1 Create Data and Password Recovery Plans © ITT Educational Services Page 1 Learning Objectives and Outcomes
You will learn general process for examining and recovering data from a hard disk.
You will create a data recovery plan for future use.
You will learn how to write a procedure for recovering a password from a computer system.
Assignment Requirements
You are a computer forensics intern at AAA Computer Forensics, a small forensics investigations and data recovery firm. Today your manager receives a call from a client in the construction industry. The client reported that a disgruntled employee reformatted a hard disk that contained valuable blueprints for a current job. The computer is an ordinary laptop that was running Windows Vista. No backup is available. The client wants that data to be recovered and at the same time has requested that you create a procedure for using an appropriate password-cracking method. You have been asked to assist in the recovery of the data and to crack passwords.
Create a data recovery plan outline that lists the steps to be performed in recovering the data in their order of importance.
Create a document that lists the steps for recovering a password from a Windows Vista, Windows 7, or Linux system. The software used should be open source. You may have to research password recovery methods on the Internet to complete the assignment.
Submission Requirements
Format: Microsoft Word
Font: Arial, Size 12, Double-Space
Citation Style: Chicago Manual of Style
Length: 3-4 pages
Self-Assessment Checklist
I have researched and identified the appropriate steps for recovering data from a reformatted hard disk.
I have properly outlined each step in the data recovery process in correct order.
I have selected an appropriate password recovery method.
I have accurately documented the password recovery method.
IS4670: Week 3 Assignment 1 Create Data and Password Recovery Plans © ITT Educational Services Page 1 Learning Objectives and Outcomes
You will learn general process for examining and recovering data from a hard disk.
You will create a data recovery plan for future use.
You will learn how to write a procedure for recovering a password from a computer system.
Assignment Requirements
You are a computer forensics intern at AAA Computer Forensics, a small forensics investigations and data recovery firm. Today your manager receives a call from a client in the construction industry. The client reported that a disgruntled employee reformatted a hard disk that contained valuable blueprints for a current job. The computer is an ordinary laptop that was running Windows Vista. No backup is available. The client wants that data to be recovered and at the same time has requested that you create a procedure for using an appropriate password-cracking method. You have been asked to assist in the recovery of the data and to crack passwords.
Create a data recovery plan outline that lists the steps to be performed in recovering the data in their order of importance.
Create a document that lists the steps for recovering a password from a Windows Vista, Windows 7, or Linux system. The software used should be open source. You may have to research password recovery methods on the Internet to complete the assignment.
Submission Requirements
Format: Microsoft Word
Font: Arial, Size 12, Double-Space
Citation Style: Chicago Manual of Style
Length: 3-4 pages
Self-Assessment Checklist
I have researched and identified the appropriate steps for recovering data from a reformatted hard disk.
I have properly outlined each step in the data recovery process in correct order.
I have selected an appropriate password recovery method.
I have accurately documented the password recovery method.
IS4670: Week 3 Assignment 1 Create Data and Password Recovery Plans © ITT Educational Services Page 1 Learning Objectives and Outcomes
You will learn general process for examining and recovering data from a hard disk.
You will create a data recovery plan for future use.
You will learn how to write a procedure for recovering a password from a computer system.
Assignment Requirements
You are a computer forensics intern at AAA Computer Forensics, a small forensics investigations and data recovery firm. Today your manager receives a call from a client in the construction industry. The client reported that a disgruntled employee reformatted a hard disk that contained valuable blueprints for a current job. The computer is an ordinary laptop that was running Windows Vista. No backup is available. The client wants that data to be recovered and at the same time has requested that you create a procedure for using an appropriate password-cracking method. You have been asked to assist in the recovery of the data and to crack passwords.
Create a data recovery plan outline that lists the steps to be performed in recovering the data in their order of importance.
Create a document that lists the steps for recovering a password from a Windows Vista, Windows 7, or Linux system. The software used should be open source. You may have to research password recovery methods on the Internet to complete the assignment.
Submission Requirements
Format: Microsoft Word
Font: Arial, Size 12, Double-Space
Citation Style: Chicago Manual of Style
Length: 3-4 pages
Self-Assessment Checklist
I have researched and identified the appropriate steps for recovering data from a reformatted hard disk.
I have properly outlined each step in the data recovery process in correct order.
I have selected an appropriate password recovery method.
I have accurately documented the password recovery method.
IS4670: Week 3 Assignment 1 Create Data and Password Recovery Plans © ITT Educational Services Page 1 Learning Objectives and Outcomes
You will learn general process for examining and recovering data from a hard disk.
You will create a data recovery plan for future use.
You will learn how to write a procedure for recovering a password from a computer system.
Assignment Requirements
You are a computer forensics intern at AAA Computer Forensics, a small forensics investigations and data recovery firm. Today your manager receives a call from a client in the construction industry. The client reported that a disgruntled employee reformatted a hard disk that contained valuable blueprints for a current job. The computer is an ordinary laptop that was running Windows Vista. No backup is available. The client wants that data to be recovered and at the same time has requested that you create a procedure for using an appropriate password-cracking method. You have been asked to assist in the recovery of the data and to crack passwords.
Create a data recovery plan outline that lists the steps to be performed in recovering the data in their order of importance.
Create a document that lists the steps for recovering a password from a Windows Vista, Windows 7, or Linux system. The software used should be open source. You may have to research password recovery methods on the Internet to complete the assignment.
Submission Requirements
Format: Microsoft Word
Font: Arial, Size 12, Double-Space
Citation Style: Chicago Manual of Style
Length: 3-4 pages
Self-Assessment Checklist
I have researched and identified the appropriate steps for recovering data from a reformatted hard disk.
I have properly outlined each step in the data recovery process in correct order.
I have selected an appropriate password recovery method.
I have accurately documented the password recovery method.
IS4670: Week 3 Assignment 1 Create Data and Password Recovery Plans © ITT Educational Services Page 1 Learning Objectives and Outcomes
You will learn general process for examining and recovering data from a hard disk.
You will create a data recovery plan for future use.
You will learn how to write a procedure for recovering a password from a computer system.
Assignment Requirements
You are a computer forensics intern at AAA Computer Forensics, a small forensics investigations and data recovery firm. Today your manager receives a call from a client in the construction industry. The client reported that a disgruntled employee reformatted a hard disk that contained valuable blueprints for a current job. The computer is an ordinary laptop that was running Windows Vista. No backup is available. The client wants that data to be recovered and at the same time has requested that you create a procedure for using an appropriate password-cracking method. You have been asked to assist in the recovery of the data and to crack passwords.
Create a data recovery plan outline that lists the steps to be performed in recovering the data in their order of importance.
Create a document that lists the steps for recovering a password from a Windows Vista, Windows 7, or Linux system. The software used should be open source. You may have to research password recovery methods on the Internet to complete the assignment.
Submission Requirements
Format: Microsoft Word
Font: Arial, Size 12, Double-Space
Citation Style: Chicago Manual of Style
Length: 3-4 pages
Self-Assessment Checklist
I have researched and identified the appropriate steps for recovering data from a reformatted hard disk.
I have properly outlined each step in the data recovery process in correct order.
I have selected an appropriate password recovery method.
I have accurately documented the password recovery method.
IS4670: Week 3 Assignment 1 Create Data and Password Recovery Plans © ITT Educational Services Page 1 Learning Objectives and Outcomes
You will learn general process for examining and recovering data from a hard disk.
You will create a data recovery plan for future use.
You will learn how to write a procedure for recovering a password from a computer system.
Assignment Requirements
You are a computer forensics intern at AAA Computer Forensics, a small forensics investigations and data recovery firm. Today your manager receives a call from a client in the construction industry. The client reported that a disgruntled employee reformatted a hard disk that contained valuable blueprints for a current job. The computer is an ordinary laptop that was running Windows Vista. No backup is available. The client wants that data to be recovered and at the same time has requested that you create a procedure for using an appropriate password-cracking method. You have been asked to assist in the recovery of the data and to crack passwords.
Create a data recovery plan outline that lists the steps to be performed in recovering the data in their order of importance.
Create a document that lists the steps for recovering a password from a Windows Vista, Windows 7, or Linux system. The software used should be open source. You may have to research password recovery methods on the Internet to complete the assignment.
Submission Requirements
Format: Microsoft Word
Font: Arial, Size 12, Double-Space
Citation Style: Chicago Manual of Style
Length: 3-4 pages
Self-Assessment Checklist
I have researched and identified the appropriate steps for recovering data from a reformatted hard disk.
I have properly outlined each step in the data recovery process in correct order.
I have selected an appropriate password recovery method.
I have accurately documented the password recovery method.
IS4670: Week 3 Assignment 1 Create Data and Password Recovery Plans © ITT Educational Services Page 1 Learning Objectives and Outcomes
You will learn general process for examining and recovering data from a hard disk.
You will create a data recovery plan for future use.
You will learn how to write a procedure for recovering a password from a computer system.
Assignment Requirements
You are a computer forensics intern at AAA Computer Forensics, a small forensics investigations and data recovery firm. Today your manager receives a call from a client in the construction industry. The client reported that a disgruntled employee reformatted a hard disk that contained valuable blueprints for a current job. The computer is an ordinary laptop that was running Windows Vista. No backup is available. The client wants that data to be recovered and at the same time has requested that you create a procedure for using an appropriate password-cracking method. You have been asked to assist in the recovery of the data and to crack passwords.
Create a data recovery plan outline that lists the steps to be performed in recovering the data in their order of importance.
Create a document that lists the steps for recovering a password from a Windows Vista, Windows 7, or Linux system. The software used should be open source. You may have to research password recovery methods on the Internet to complete the assignment.
Submission Requirements
Format: Microsoft Word
Font: Arial, Size 12, Double-Space
Citation Style: Chicago Manual of Style
Length: 3-4 pages
Self-Assessment Checklist
I have researched and identified the appropriate steps for recovering data from a reformatted hard disk.
I have properly outlined each step in the data recovery process in correct order.
I have selected an appropriate password recovery method.
I have accurately documented the password recovery method.
IS4670: Week 3 Assignment 1 Create Data and Password Recovery Plans © ITT Educational Services Page 1 Learning Objectives and Outcomes
You will learn general process for examining and recovering data from a hard disk.
You will create a data recovery plan for future use.
You will learn how to write a procedure for recovering a password from a computer system.
Assignment Requirements
You are a computer forensics intern at AAA Computer Forensics, a small forensics investigations and data recovery firm. Today your manager receives a call from a client in the construction industry. The client reported that a disgruntled employee reformatted a hard disk that contained valuable blueprints for a current job. The computer is an ordinary laptop that was running Windows Vista. No backup is available. The client wants that data to be recovered and at the same time has requested that you create a procedure for using an appropriate password-cracking method. You have been asked to assist in the recovery of the data and to crack passwords.
Create a data recovery plan outline that lists the steps to be performed in recovering the data in their order of importance.
Create a document that lists the steps for recovering a password from a Windows Vista, Windows 7, or Linux system. The software used should be open source. You may have to research password recovery methods on the Internet to complete the assignment.
Submission Requirements
Format: Microsoft Word
Font: Arial, Size 12, Double-Space
Citation Style: Chicago Manual of Style
Length: 3-4 pages
Self-Assessment Checklist
I have researched and identified the appropriate steps for recovering data from a reformatted hard disk.
I have properly outlined each step in the data recovery process in correct order.
I have selected an appropriate password recovery method.
I have accurately documented the password recovery method.