Verantwortlich | KLEDIA Group |
---|---|
Zuletzt aktualisiert | 30.05.2025 |
Mitglieder | 1 |
-
Module 1: Computer Forensics in Today’s World4Lektionen ·
-
Understanding computer forensicsNeu
-
Cybercrime and its implicationsNeu
-
Forensic investigation processNeu
-
Legal and ethical issuesNeu
-
-
Module 2: Computer Forensics Investigation Process3Lektionen ·
-
Preparing for an investigationNeu
-
Evidence acquisition and handlingNeu
-
Data analysis and reportingNeu
-
-
Module 3: Understanding Hard Disks and File Systems3Lektionen ·
-
Hard disk architectureNeu
-
File system overview (FAT, NTFS, EXT, etc.)Neu
-
Disk partitioning and boot processesNeu
-
-
Module 4: Data Acquisition and Duplication3Lektionen ·
-
Forensic imaging tools and techniquesNeu
-
Write protection methodsNeu
-
Validation and verification of dataNeu
-
-
Module 5: Defeating Anti-Forensics Techniques3Lektionen ·
-
Detection of data hiding (stenography, encryption, etc.)Neu
-
Handling encrypted filesNeu
-
Dealing with password-protected filesNeu
-
-
Module 6: Windows Forensics3Lektionen ·
-
Windows artifacts (registry, event logs, prefetch, etc.)Neu
-
Memory forensicsNeu
-
Timeline analysisNeu
-
-
Module 7: Linux and Mac Forensics3Lektionen ·
-
Linux file systems and artifactsNeu
-
Mac OS X forensicsNeu
-
Shell commands for forensic analysisNeu
-
-
Module 8: Network Forensics3Lektionen ·
-
Investigating network trafficNeu
-
Log analysis (firewall, IDS/IPS, proxy)Neu
-
Wireless and cloud forensicsNeu
-
-
Module 9: Investigating Web Attacks5Lektionen ·
-
Web application attack forensicsNeu
-
Investigating email crimesNeu
-
Social media forensicsNeu
-
Database log analysisNeu
-
Cloud computing forensics challengesNeu
-
-
Module 10: Dark Web Forensics3Lektionen ·
-
Tor network investigationsNeu
-
Cryptocurrency forensicsNeu
-
Dark web evidence collectionNeu
-
-
Module 11: Database Forensics2Lektionen ·
-
Database attack investigationsNeu
-
SQL injection forensicsNeu
-
-
Module 12: Cloud Forensics2Lektionen ·
-
Evidence collection from cloud environmentsNeu
-
Legal aspects of cloud investigationsNeu
-
-
Module 13: Malware Forensics3Lektionen ·
-
Analyzing malicious softwareNeu
-
Reverse engineering malwareNeu
-
Memory forensics for malware detectionNeu
-
-
Module 14: Investigating Email Crimes3Lektionen ·
-
Email header analysisNeu
-
Phishing and spam investigationNeu
-
Tracing email originsNeu
-
-
Module 15: Mobile Forensics3Lektionen ·
-
Mobile device acquisition techniquesNeu
-
iOS and Android forensicsNeu
-
Mobile app investigationsNeu
-
-
Module 16: IoT Forensics3Lektionen ·
-
Challenges in IoT investigationsNeu
-
Smart device forensicsNeu
-
Vehicle forensicsNeu
-
-
Module 17: Forensic Report Writing and Presentation3Lektionen ·
-
Structuring a forensic reportNeu
-
Legal considerations in reportingNeu
-
Expert testimony preparationNeu
-