Atbildīgais | KLEDIA Group |
---|---|
Pēdējoreiz atjaunots | 2025.05.30. |
Biedri | 1 |
-
Module 1: Computer Forensics in Today’s World4Lessons ·
-
Understanding computer forensicsJauns
-
Cybercrime and its implicationsJauns
-
Forensic investigation processJauns
-
Legal and ethical issuesJauns
-
-
Module 2: Computer Forensics Investigation Process3Lessons ·
-
Preparing for an investigationJauns
-
Evidence acquisition and handlingJauns
-
Data analysis and reportingJauns
-
-
Module 3: Understanding Hard Disks and File Systems3Lessons ·
-
Hard disk architectureJauns
-
File system overview (FAT, NTFS, EXT, etc.)Jauns
-
Disk partitioning and boot processesJauns
-
-
Module 4: Data Acquisition and Duplication3Lessons ·
-
Forensic imaging tools and techniquesJauns
-
Write protection methodsJauns
-
Validation and verification of dataJauns
-
-
Module 5: Defeating Anti-Forensics Techniques3Lessons ·
-
Detection of data hiding (stenography, encryption, etc.)Jauns
-
Handling encrypted filesJauns
-
Dealing with password-protected filesJauns
-
-
Module 6: Windows Forensics3Lessons ·
-
Windows artifacts (registry, event logs, prefetch, etc.)Jauns
-
Memory forensicsJauns
-
Timeline analysisJauns
-
-
Module 7: Linux and Mac Forensics3Lessons ·
-
Linux file systems and artifactsJauns
-
Mac OS X forensicsJauns
-
Shell commands for forensic analysisJauns
-
-
Module 8: Network Forensics3Lessons ·
-
Investigating network trafficJauns
-
Log analysis (firewall, IDS/IPS, proxy)Jauns
-
Wireless and cloud forensicsJauns
-
-
Module 9: Investigating Web Attacks5Lessons ·
-
Web application attack forensicsJauns
-
Investigating email crimesJauns
-
Social media forensicsJauns
-
Database log analysisJauns
-
Cloud computing forensics challengesJauns
-
-
Module 10: Dark Web Forensics3Lessons ·
-
Tor network investigationsJauns
-
Cryptocurrency forensicsJauns
-
Dark web evidence collectionJauns
-
-
Module 11: Database Forensics2Lessons ·
-
Database attack investigationsJauns
-
SQL injection forensicsJauns
-
-
Module 12: Cloud Forensics2Lessons ·
-
Evidence collection from cloud environmentsJauns
-
Legal aspects of cloud investigationsJauns
-
-
Module 13: Malware Forensics3Lessons ·
-
Analyzing malicious softwareJauns
-
Reverse engineering malwareJauns
-
Memory forensics for malware detectionJauns
-
-
Module 14: Investigating Email Crimes3Lessons ·
-
Email header analysisJauns
-
Phishing and spam investigationJauns
-
Tracing email originsJauns
-
-
Module 15: Mobile Forensics3Lessons ·
-
Mobile device acquisition techniquesJauns
-
iOS and Android forensicsJauns
-
Mobile app investigationsJauns
-
-
Module 16: IoT Forensics3Lessons ·
-
Challenges in IoT investigationsJauns
-
Smart device forensicsJauns
-
Vehicle forensicsJauns
-
-
Module 17: Forensic Report Writing and Presentation3Lessons ·
-
Structuring a forensic reportJauns
-
Legal considerations in reportingJauns
-
Expert testimony preparationJauns
-