Отговорен | KLEDIA Group |
---|---|
Последна актуализация | 30.05.2025 |
Членове | 1 |
-
Module 1: Computer Forensics in Today’s World4Уроци ·
-
Understanding computer forensicsНов
-
Cybercrime and its implicationsНов
-
Forensic investigation processНов
-
Legal and ethical issuesНов
-
-
Module 2: Computer Forensics Investigation Process3Уроци ·
-
Preparing for an investigationНов
-
Evidence acquisition and handlingНов
-
Data analysis and reportingНов
-
-
Module 3: Understanding Hard Disks and File Systems3Уроци ·
-
Hard disk architectureНов
-
File system overview (FAT, NTFS, EXT, etc.)Нов
-
Disk partitioning and boot processesНов
-
-
Module 4: Data Acquisition and Duplication3Уроци ·
-
Forensic imaging tools and techniquesНов
-
Write protection methodsНов
-
Validation and verification of dataНов
-
-
Module 5: Defeating Anti-Forensics Techniques3Уроци ·
-
Detection of data hiding (stenography, encryption, etc.)Нов
-
Handling encrypted filesНов
-
Dealing with password-protected filesНов
-
-
Module 6: Windows Forensics3Уроци ·
-
Windows artifacts (registry, event logs, prefetch, etc.)Нов
-
Memory forensicsНов
-
Timeline analysisНов
-
-
Module 7: Linux and Mac Forensics3Уроци ·
-
Linux file systems and artifactsНов
-
Mac OS X forensicsНов
-
Shell commands for forensic analysisНов
-
-
Module 8: Network Forensics3Уроци ·
-
Investigating network trafficНов
-
Log analysis (firewall, IDS/IPS, proxy)Нов
-
Wireless and cloud forensicsНов
-
-
Module 9: Investigating Web Attacks5Уроци ·
-
Web application attack forensicsНов
-
Investigating email crimesНов
-
Social media forensicsНов
-
Database log analysisНов
-
Cloud computing forensics challengesНов
-
-
Module 10: Dark Web Forensics3Уроци ·
-
Tor network investigationsНов
-
Cryptocurrency forensicsНов
-
Dark web evidence collectionНов
-
-
Module 11: Database Forensics2Уроци ·
-
Database attack investigationsНов
-
SQL injection forensicsНов
-
-
Module 12: Cloud Forensics2Уроци ·
-
Evidence collection from cloud environmentsНов
-
Legal aspects of cloud investigationsНов
-
-
Module 13: Malware Forensics3Уроци ·
-
Analyzing malicious softwareНов
-
Reverse engineering malwareНов
-
Memory forensics for malware detectionНов
-
-
Module 14: Investigating Email Crimes3Уроци ·
-
Email header analysisНов
-
Phishing and spam investigationНов
-
Tracing email originsНов
-
-
Module 15: Mobile Forensics3Уроци ·
-
Mobile device acquisition techniquesНов
-
iOS and Android forensicsНов
-
Mobile app investigationsНов
-
-
Module 16: IoT Forensics3Уроци ·
-
Challenges in IoT investigationsНов
-
Smart device forensicsНов
-
Vehicle forensicsНов
-
-
Module 17: Forensic Report Writing and Presentation3Уроци ·
-
Structuring a forensic reportНов
-
Legal considerations in reportingНов
-
Expert testimony preparationНов
-