المسؤول | KLEDIA Group |
---|---|
آخر تحديث | 30 مايو, 2025 |
الأعضاء | 1 |
-
Module 1: Computer Forensics in Today’s World4الدروس ·
-
Understanding computer forensicsجديد
-
Cybercrime and its implicationsجديد
-
Forensic investigation processجديد
-
Legal and ethical issuesجديد
-
-
Module 2: Computer Forensics Investigation Process3الدروس ·
-
Preparing for an investigationجديد
-
Evidence acquisition and handlingجديد
-
Data analysis and reportingجديد
-
-
Module 3: Understanding Hard Disks and File Systems3الدروس ·
-
Hard disk architectureجديد
-
File system overview (FAT, NTFS, EXT, etc.)جديد
-
Disk partitioning and boot processesجديد
-
-
Module 4: Data Acquisition and Duplication3الدروس ·
-
Forensic imaging tools and techniquesجديد
-
Write protection methodsجديد
-
Validation and verification of dataجديد
-
-
Module 5: Defeating Anti-Forensics Techniques3الدروس ·
-
Detection of data hiding (stenography, encryption, etc.)جديد
-
Handling encrypted filesجديد
-
Dealing with password-protected filesجديد
-
-
Module 6: Windows Forensics3الدروس ·
-
Windows artifacts (registry, event logs, prefetch, etc.)جديد
-
Memory forensicsجديد
-
Timeline analysisجديد
-
-
Module 7: Linux and Mac Forensics3الدروس ·
-
Linux file systems and artifactsجديد
-
Mac OS X forensicsجديد
-
Shell commands for forensic analysisجديد
-
-
Module 8: Network Forensics3الدروس ·
-
Investigating network trafficجديد
-
Log analysis (firewall, IDS/IPS, proxy)جديد
-
Wireless and cloud forensicsجديد
-
-
Module 9: Investigating Web Attacks5الدروس ·
-
Web application attack forensicsجديد
-
Investigating email crimesجديد
-
Social media forensicsجديد
-
Database log analysisجديد
-
Cloud computing forensics challengesجديد
-
-
Module 10: Dark Web Forensics3الدروس ·
-
Tor network investigationsجديد
-
Cryptocurrency forensicsجديد
-
Dark web evidence collectionجديد
-
-
Module 11: Database Forensics2الدروس ·
-
Database attack investigationsجديد
-
SQL injection forensicsجديد
-
-
Module 12: Cloud Forensics2الدروس ·
-
Evidence collection from cloud environmentsجديد
-
Legal aspects of cloud investigationsجديد
-
-
Module 13: Malware Forensics3الدروس ·
-
Analyzing malicious softwareجديد
-
Reverse engineering malwareجديد
-
Memory forensics for malware detectionجديد
-
-
Module 14: Investigating Email Crimes3الدروس ·
-
Email header analysisجديد
-
Phishing and spam investigationجديد
-
Tracing email originsجديد
-
-
Module 15: Mobile Forensics3الدروس ·
-
Mobile device acquisition techniquesجديد
-
iOS and Android forensicsجديد
-
Mobile app investigationsجديد
-
-
Module 16: IoT Forensics3الدروس ·
-
Challenges in IoT investigationsجديد
-
Smart device forensicsجديد
-
Vehicle forensicsجديد
-
-
Module 17: Forensic Report Writing and Presentation3الدروس ·
-
Structuring a forensic reportجديد
-
Legal considerations in reportingجديد
-
Expert testimony preparationجديد
-