אחראי | KLEDIA Group |
---|---|
עדכון אחרון | 30/05/2025 |
אנשי צוות | 1 |
-
Module 1: Computer Forensics in Today’s World4Lessons ·
-
Understanding computer forensicsחדש
-
Cybercrime and its implicationsחדש
-
Forensic investigation processחדש
-
Legal and ethical issuesחדש
-
-
Module 2: Computer Forensics Investigation Process3Lessons ·
-
Preparing for an investigationחדש
-
Evidence acquisition and handlingחדש
-
Data analysis and reportingחדש
-
-
Module 3: Understanding Hard Disks and File Systems3Lessons ·
-
Hard disk architectureחדש
-
File system overview (FAT, NTFS, EXT, etc.)חדש
-
Disk partitioning and boot processesחדש
-
-
Module 4: Data Acquisition and Duplication3Lessons ·
-
Forensic imaging tools and techniquesחדש
-
Write protection methodsחדש
-
Validation and verification of dataחדש
-
-
Module 5: Defeating Anti-Forensics Techniques3Lessons ·
-
Detection of data hiding (stenography, encryption, etc.)חדש
-
Handling encrypted filesחדש
-
Dealing with password-protected filesחדש
-
-
Module 6: Windows Forensics3Lessons ·
-
Windows artifacts (registry, event logs, prefetch, etc.)חדש
-
Memory forensicsחדש
-
Timeline analysisחדש
-
-
Module 7: Linux and Mac Forensics3Lessons ·
-
Linux file systems and artifactsחדש
-
Mac OS X forensicsחדש
-
Shell commands for forensic analysisחדש
-
-
Module 8: Network Forensics3Lessons ·
-
Investigating network trafficחדש
-
Log analysis (firewall, IDS/IPS, proxy)חדש
-
Wireless and cloud forensicsחדש
-
-
Module 9: Investigating Web Attacks5Lessons ·
-
Web application attack forensicsחדש
-
Investigating email crimesחדש
-
Social media forensicsחדש
-
Database log analysisחדש
-
Cloud computing forensics challengesחדש
-
-
Module 10: Dark Web Forensics3Lessons ·
-
Tor network investigationsחדש
-
Cryptocurrency forensicsחדש
-
Dark web evidence collectionחדש
-
-
Module 11: Database Forensics2Lessons ·
-
Database attack investigationsחדש
-
SQL injection forensicsחדש
-
-
Module 12: Cloud Forensics2Lessons ·
-
Evidence collection from cloud environmentsחדש
-
Legal aspects of cloud investigationsחדש
-
-
Module 13: Malware Forensics3Lessons ·
-
Analyzing malicious softwareחדש
-
Reverse engineering malwareחדש
-
Memory forensics for malware detectionחדש
-
-
Module 14: Investigating Email Crimes3Lessons ·
-
Email header analysisחדש
-
Phishing and spam investigationחדש
-
Tracing email originsחדש
-
-
Module 15: Mobile Forensics3Lessons ·
-
Mobile device acquisition techniquesחדש
-
iOS and Android forensicsחדש
-
Mobile app investigationsחדש
-
-
Module 16: IoT Forensics3Lessons ·
-
Challenges in IoT investigationsחדש
-
Smart device forensicsחדש
-
Vehicle forensicsחדש
-
-
Module 17: Forensic Report Writing and Presentation3Lessons ·
-
Structuring a forensic reportחדש
-
Legal considerations in reportingחדש
-
Expert testimony preparationחדש
-