This document provides an overview of computer forensics. It defines computer forensics and explains its need in addressing rising cybercrime. It outlines types of computer forensics and common cybercrimes. The document also describes the components and steps involved in computer forensics investigations, including acquiring evidence, creating forensic images, and analyzing data. It discusses important digital evidence sources like metadata, slack space, swap files, and unallocated space.