Vastutaja | KLEDIA Group |
---|---|
Viimati uuendatud | 30.05.2025 |
Osalejad | 1 |
-
Module 1: Computer Forensics in Today’s World4Tunnid ·
-
Understanding computer forensicsUus
-
Cybercrime and its implicationsUus
-
Forensic investigation processUus
-
Legal and ethical issuesUus
-
-
Module 2: Computer Forensics Investigation Process3Tunnid ·
-
Preparing for an investigationUus
-
Evidence acquisition and handlingUus
-
Data analysis and reportingUus
-
-
Module 3: Understanding Hard Disks and File Systems3Tunnid ·
-
Hard disk architectureUus
-
File system overview (FAT, NTFS, EXT, etc.)Uus
-
Disk partitioning and boot processesUus
-
-
Module 4: Data Acquisition and Duplication3Tunnid ·
-
Forensic imaging tools and techniquesUus
-
Write protection methodsUus
-
Validation and verification of dataUus
-
-
Module 5: Defeating Anti-Forensics Techniques3Tunnid ·
-
Detection of data hiding (stenography, encryption, etc.)Uus
-
Handling encrypted filesUus
-
Dealing with password-protected filesUus
-
-
Module 6: Windows Forensics3Tunnid ·
-
Windows artifacts (registry, event logs, prefetch, etc.)Uus
-
Memory forensicsUus
-
Timeline analysisUus
-
-
Module 7: Linux and Mac Forensics3Tunnid ·
-
Linux file systems and artifactsUus
-
Mac OS X forensicsUus
-
Shell commands for forensic analysisUus
-
-
Module 8: Network Forensics3Tunnid ·
-
Investigating network trafficUus
-
Log analysis (firewall, IDS/IPS, proxy)Uus
-
Wireless and cloud forensicsUus
-
-
Module 9: Investigating Web Attacks5Tunnid ·
-
Web application attack forensicsUus
-
Investigating email crimesUus
-
Social media forensicsUus
-
Database log analysisUus
-
Cloud computing forensics challengesUus
-
-
Module 10: Dark Web Forensics3Tunnid ·
-
Tor network investigationsUus
-
Cryptocurrency forensicsUus
-
Dark web evidence collectionUus
-
-
Module 11: Database Forensics2Tunnid ·
-
Database attack investigationsUus
-
SQL injection forensicsUus
-
-
Module 12: Cloud Forensics2Tunnid ·
-
Evidence collection from cloud environmentsUus
-
Legal aspects of cloud investigationsUus
-
-
Module 13: Malware Forensics3Tunnid ·
-
Analyzing malicious softwareUus
-
Reverse engineering malwareUus
-
Memory forensics for malware detectionUus
-
-
Module 14: Investigating Email Crimes3Tunnid ·
-
Email header analysisUus
-
Phishing and spam investigationUus
-
Tracing email originsUus
-
-
Module 15: Mobile Forensics3Tunnid ·
-
Mobile device acquisition techniquesUus
-
iOS and Android forensicsUus
-
Mobile app investigationsUus
-
-
Module 16: IoT Forensics3Tunnid ·
-
Challenges in IoT investigationsUus
-
Smart device forensicsUus
-
Vehicle forensicsUus
-
-
Module 17: Forensic Report Writing and Presentation3Tunnid ·
-
Structuring a forensic reportUus
-
Legal considerations in reportingUus
-
Expert testimony preparationUus
-