Felelős | KLEDIA Group |
---|---|
Utolsó frissítés | 2025-05-30 |
Tagok | 1 |
-
Module 1: Computer Forensics in Today’s World4Lessons ·
-
Understanding computer forensicsÚj
-
Cybercrime and its implicationsÚj
-
Forensic investigation processÚj
-
Legal and ethical issuesÚj
-
-
Module 2: Computer Forensics Investigation Process3Lessons ·
-
Preparing for an investigationÚj
-
Evidence acquisition and handlingÚj
-
Data analysis and reportingÚj
-
-
Module 3: Understanding Hard Disks and File Systems3Lessons ·
-
Hard disk architectureÚj
-
File system overview (FAT, NTFS, EXT, etc.)Új
-
Disk partitioning and boot processesÚj
-
-
Module 4: Data Acquisition and Duplication3Lessons ·
-
Forensic imaging tools and techniquesÚj
-
Write protection methodsÚj
-
Validation and verification of dataÚj
-
-
Module 5: Defeating Anti-Forensics Techniques3Lessons ·
-
Detection of data hiding (stenography, encryption, etc.)Új
-
Handling encrypted filesÚj
-
Dealing with password-protected filesÚj
-
-
Module 6: Windows Forensics3Lessons ·
-
Windows artifacts (registry, event logs, prefetch, etc.)Új
-
Memory forensicsÚj
-
Timeline analysisÚj
-
-
Module 7: Linux and Mac Forensics3Lessons ·
-
Linux file systems and artifactsÚj
-
Mac OS X forensicsÚj
-
Shell commands for forensic analysisÚj
-
-
Module 8: Network Forensics3Lessons ·
-
Investigating network trafficÚj
-
Log analysis (firewall, IDS/IPS, proxy)Új
-
Wireless and cloud forensicsÚj
-
-
Module 9: Investigating Web Attacks5Lessons ·
-
Web application attack forensicsÚj
-
Investigating email crimesÚj
-
Social media forensicsÚj
-
Database log analysisÚj
-
Cloud computing forensics challengesÚj
-
-
Module 10: Dark Web Forensics3Lessons ·
-
Tor network investigationsÚj
-
Cryptocurrency forensicsÚj
-
Dark web evidence collectionÚj
-
-
Module 11: Database Forensics2Lessons ·
-
Database attack investigationsÚj
-
SQL injection forensicsÚj
-
-
Module 12: Cloud Forensics2Lessons ·
-
Evidence collection from cloud environmentsÚj
-
Legal aspects of cloud investigationsÚj
-
-
Module 13: Malware Forensics3Lessons ·
-
Analyzing malicious softwareÚj
-
Reverse engineering malwareÚj
-
Memory forensics for malware detectionÚj
-
-
Module 14: Investigating Email Crimes3Lessons ·
-
Email header analysisÚj
-
Phishing and spam investigationÚj
-
Tracing email originsÚj
-
-
Module 15: Mobile Forensics3Lessons ·
-
Mobile device acquisition techniquesÚj
-
iOS and Android forensicsÚj
-
Mobile app investigationsÚj
-
-
Module 16: IoT Forensics3Lessons ·
-
Challenges in IoT investigationsÚj
-
Smart device forensicsÚj
-
Vehicle forensicsÚj
-
-
Module 17: Forensic Report Writing and Presentation3Lessons ·
-
Structuring a forensic reportÚj
-
Legal considerations in reportingÚj
-
Expert testimony preparationÚj
-