Преминете към съдържание
Отговорен KLEDIA Group
Последна актуализация 30.05.2025
Членове 1
  • Module 1: Computer Forensics in Today’s World
    4Уроци ·
    • Understanding computer forensics
      Нов
    • Cybercrime and its implications
      Нов
    • Forensic investigation process
      Нов
    • Legal and ethical issues
      Нов
  • Module 2: Computer Forensics Investigation Process
    3Уроци ·
    • Preparing for an investigation
      Нов
    • Evidence acquisition and handling
      Нов
    • Data analysis and reporting
      Нов
  • Module 3: Understanding Hard Disks and File Systems
    3Уроци ·
    • Hard disk architecture
      Нов
    • File system overview (FAT, NTFS, EXT, etc.)
      Нов
    • Disk partitioning and boot processes
      Нов
  • Module 4: Data Acquisition and Duplication
    3Уроци ·
    • Forensic imaging tools and techniques
      Нов
    • Write protection methods
      Нов
    • Validation and verification of data
      Нов
  • Module 5: Defeating Anti-Forensics Techniques
    3Уроци ·
    • Detection of data hiding (stenography, encryption, etc.)
      Нов
    • Handling encrypted files
      Нов
    • Dealing with password-protected files
      Нов
  • Module 6: Windows Forensics
    3Уроци ·
    • Windows artifacts (registry, event logs, prefetch, etc.)
      Нов
    • Memory forensics
      Нов
    • Timeline analysis
      Нов
  • Module 7: Linux and Mac Forensics
    3Уроци ·
    • Linux file systems and artifacts
      Нов
    • Mac OS X forensics
      Нов
    • Shell commands for forensic analysis
      Нов
  • Module 8: Network Forensics
    3Уроци ·
    • Investigating network traffic
      Нов
    • Log analysis (firewall, IDS/IPS, proxy)
      Нов
    • Wireless and cloud forensics
      Нов
  • Module 9: Investigating Web Attacks
    5Уроци ·
    • Web application attack forensics
      Нов
    • Investigating email crimes
      Нов
    • Social media forensics
      Нов
    • Database log analysis
      Нов
    • Cloud computing forensics challenges
      Нов
  • Module 10: Dark Web Forensics
    3Уроци ·
    • Tor network investigations
      Нов
    • Cryptocurrency forensics
      Нов
    • Dark web evidence collection
      Нов
  • Module 11: Database Forensics
    2Уроци ·
    • Database attack investigations
      Нов
    • SQL injection forensics
      Нов
  • Module 12: Cloud Forensics
    2Уроци ·
    • Evidence collection from cloud environments
      Нов
    • Legal aspects of cloud investigations
      Нов
  • Module 13: Malware Forensics
    3Уроци ·
    • Analyzing malicious software
      Нов
    • Reverse engineering malware
      Нов
    • Memory forensics for malware detection
      Нов
  • Module 14: Investigating Email Crimes
    3Уроци ·
    • Email header analysis
      Нов
    • Phishing and spam investigation
      Нов
    • Tracing email origins
      Нов
  • Module 15: Mobile Forensics
    3Уроци ·
    • Mobile device acquisition techniques
      Нов
    • iOS and Android forensics
      Нов
    • Mobile app investigations
      Нов
  • Module 16: IoT Forensics
    3Уроци ·
    • Challenges in IoT investigations
      Нов
    • Smart device forensics
      Нов
    • Vehicle forensics
      Нов
  • Module 17: Forensic Report Writing and Presentation
    3Уроци ·
    • Structuring a forensic report
      Нов
    • Legal considerations in reporting
      Нов
    • Expert testimony preparation
      Нов