CHFI
Хариуцагч | KLEDIA Group |
---|---|
Сүүлийн Шинэчлэл | 2025-05-30 |
Гишүүд | 1 |
-
Module 1: Computer Forensics in Today’s World4Lessons ·
-
Understanding computer forensicsШинэ
-
Cybercrime and its implicationsШинэ
-
Forensic investigation processШинэ
-
Legal and ethical issuesШинэ
-
-
Module 2: Computer Forensics Investigation Process3Lessons ·
-
Preparing for an investigationШинэ
-
Evidence acquisition and handlingШинэ
-
Data analysis and reportingШинэ
-
-
Module 3: Understanding Hard Disks and File Systems3Lessons ·
-
Hard disk architectureШинэ
-
File system overview (FAT, NTFS, EXT, etc.)Шинэ
-
Disk partitioning and boot processesШинэ
-
-
Module 4: Data Acquisition and Duplication3Lessons ·
-
Forensic imaging tools and techniquesШинэ
-
Write protection methodsШинэ
-
Validation and verification of dataШинэ
-
-
Module 5: Defeating Anti-Forensics Techniques3Lessons ·
-
Detection of data hiding (stenography, encryption, etc.)Шинэ
-
Handling encrypted filesШинэ
-
Dealing with password-protected filesШинэ
-
-
Module 6: Windows Forensics3Lessons ·
-
Windows artifacts (registry, event logs, prefetch, etc.)Шинэ
-
Memory forensicsШинэ
-
Timeline analysisШинэ
-
-
Module 7: Linux and Mac Forensics3Lessons ·
-
Linux file systems and artifactsШинэ
-
Mac OS X forensicsШинэ
-
Shell commands for forensic analysisШинэ
-
-
Module 8: Network Forensics3Lessons ·
-
Investigating network trafficШинэ
-
Log analysis (firewall, IDS/IPS, proxy)Шинэ
-
Wireless and cloud forensicsШинэ
-
-
Module 9: Investigating Web Attacks5Lessons ·
-
Web application attack forensicsШинэ
-
Investigating email crimesШинэ
-
Social media forensicsШинэ
-
Database log analysisШинэ
-
Cloud computing forensics challengesШинэ
-
-
Module 10: Dark Web Forensics3Lessons ·
-
Tor network investigationsШинэ
-
Cryptocurrency forensicsШинэ
-
Dark web evidence collectionШинэ
-
-
Module 11: Database Forensics2Lessons ·
-
Database attack investigationsШинэ
-
SQL injection forensicsШинэ
-
-
Module 12: Cloud Forensics2Lessons ·
-
Evidence collection from cloud environmentsШинэ
-
Legal aspects of cloud investigationsШинэ
-
-
Module 13: Malware Forensics3Lessons ·
-
Analyzing malicious softwareШинэ
-
Reverse engineering malwareШинэ
-
Memory forensics for malware detectionШинэ
-
-
Module 14: Investigating Email Crimes3Lessons ·
-
Email header analysisШинэ
-
Phishing and spam investigationШинэ
-
Tracing email originsШинэ
-
-
Module 15: Mobile Forensics3Lessons ·
-
Mobile device acquisition techniquesШинэ
-
iOS and Android forensicsШинэ
-
Mobile app investigationsШинэ
-
-
Module 16: IoT Forensics3Lessons ·
-
Challenges in IoT investigationsШинэ
-
Smart device forensicsШинэ
-
Vehicle forensicsШинэ
-
-
Module 17: Forensic Report Writing and Presentation3Lessons ·
-
Structuring a forensic reportШинэ
-
Legal considerations in reportingШинэ
-
Expert testimony preparationШинэ
-