Responsabile | KLEDIA Group |
---|---|
Ultimo aggiornamento | 30/05/2025 |
Iscritti | 1 |
-
Module 1: Computer Forensics in Today’s World4Lezioni ·
-
Understanding computer forensicsNuova
-
Cybercrime and its implicationsNuova
-
Forensic investigation processNuova
-
Legal and ethical issuesNuova
-
-
Module 2: Computer Forensics Investigation Process3Lezioni ·
-
Preparing for an investigationNuova
-
Evidence acquisition and handlingNuova
-
Data analysis and reportingNuova
-
-
Module 3: Understanding Hard Disks and File Systems3Lezioni ·
-
Hard disk architectureNuova
-
File system overview (FAT, NTFS, EXT, etc.)Nuova
-
Disk partitioning and boot processesNuova
-
-
Module 4: Data Acquisition and Duplication3Lezioni ·
-
Forensic imaging tools and techniquesNuova
-
Write protection methodsNuova
-
Validation and verification of dataNuova
-
-
Module 5: Defeating Anti-Forensics Techniques3Lezioni ·
-
Detection of data hiding (stenography, encryption, etc.)Nuova
-
Handling encrypted filesNuova
-
Dealing with password-protected filesNuova
-
-
Module 6: Windows Forensics3Lezioni ·
-
Windows artifacts (registry, event logs, prefetch, etc.)Nuova
-
Memory forensicsNuova
-
Timeline analysisNuova
-
-
Module 7: Linux and Mac Forensics3Lezioni ·
-
Linux file systems and artifactsNuova
-
Mac OS X forensicsNuova
-
Shell commands for forensic analysisNuova
-
-
Module 8: Network Forensics3Lezioni ·
-
Investigating network trafficNuova
-
Log analysis (firewall, IDS/IPS, proxy)Nuova
-
Wireless and cloud forensicsNuova
-
-
Module 9: Investigating Web Attacks5Lezioni ·
-
Web application attack forensicsNuova
-
Investigating email crimesNuova
-
Social media forensicsNuova
-
Database log analysisNuova
-
Cloud computing forensics challengesNuova
-
-
Module 10: Dark Web Forensics3Lezioni ·
-
Tor network investigationsNuova
-
Cryptocurrency forensicsNuova
-
Dark web evidence collectionNuova
-
-
Module 11: Database Forensics2Lezioni ·
-
Database attack investigationsNuova
-
SQL injection forensicsNuova
-
-
Module 12: Cloud Forensics2Lezioni ·
-
Evidence collection from cloud environmentsNuova
-
Legal aspects of cloud investigationsNuova
-
-
Module 13: Malware Forensics3Lezioni ·
-
Analyzing malicious softwareNuova
-
Reverse engineering malwareNuova
-
Memory forensics for malware detectionNuova
-
-
Module 14: Investigating Email Crimes3Lezioni ·
-
Email header analysisNuova
-
Phishing and spam investigationNuova
-
Tracing email originsNuova
-
-
Module 15: Mobile Forensics3Lezioni ·
-
Mobile device acquisition techniquesNuova
-
iOS and Android forensicsNuova
-
Mobile app investigationsNuova
-
-
Module 16: IoT Forensics3Lezioni ·
-
Challenges in IoT investigationsNuova
-
Smart device forensicsNuova
-
Vehicle forensicsNuova
-
-
Module 17: Forensic Report Writing and Presentation3Lezioni ·
-
Structuring a forensic reportNuova
-
Legal considerations in reportingNuova
-
Expert testimony preparationNuova
-