Responsible | KLEDIA Group |
---|---|
Last Update | 30/05/2025 |
Members | 1 |
-
Module 1: Computer Forensics in Today’s World4Lessons ·
-
Understanding computer forensicsNew
-
Cybercrime and its implicationsNew
-
Forensic investigation processNew
-
Legal and ethical issuesNew
-
-
Module 2: Computer Forensics Investigation Process3Lessons ·
-
Preparing for an investigationNew
-
Evidence acquisition and handlingNew
-
Data analysis and reportingNew
-
-
Module 3: Understanding Hard Disks and File Systems3Lessons ·
-
Hard disk architectureNew
-
File system overview (FAT, NTFS, EXT, etc.)New
-
Disk partitioning and boot processesNew
-
-
Module 4: Data Acquisition and Duplication3Lessons ·
-
Forensic imaging tools and techniquesNew
-
Write protection methodsNew
-
Validation and verification of dataNew
-
-
Module 5: Defeating Anti-Forensics Techniques3Lessons ·
-
Detection of data hiding (stenography, encryption, etc.)New
-
Handling encrypted filesNew
-
Dealing with password-protected filesNew
-
-
Module 6: Windows Forensics3Lessons ·
-
Windows artifacts (registry, event logs, prefetch, etc.)New
-
Memory forensicsNew
-
Timeline analysisNew
-
-
Module 7: Linux and Mac Forensics3Lessons ·
-
Linux file systems and artifactsNew
-
Mac OS X forensicsNew
-
Shell commands for forensic analysisNew
-
-
Module 8: Network Forensics3Lessons ·
-
Investigating network trafficNew
-
Log analysis (firewall, IDS/IPS, proxy)New
-
Wireless and cloud forensicsNew
-
-
Module 9: Investigating Web Attacks5Lessons ·
-
Web application attack forensicsNew
-
Investigating email crimesNew
-
Social media forensicsNew
-
Database log analysisNew
-
Cloud computing forensics challengesNew
-
-
Module 10: Dark Web Forensics3Lessons ·
-
Tor network investigationsNew
-
Cryptocurrency forensicsNew
-
Dark web evidence collectionNew
-
-
Module 11: Database Forensics2Lessons ·
-
Database attack investigationsNew
-
SQL injection forensicsNew
-
-
Module 12: Cloud Forensics2Lessons ·
-
Evidence collection from cloud environmentsNew
-
Legal aspects of cloud investigationsNew
-
-
Module 13: Malware Forensics3Lessons ·
-
Analyzing malicious softwareNew
-
Reverse engineering malwareNew
-
Memory forensics for malware detectionNew
-
-
Module 14: Investigating Email Crimes3Lessons ·
-
Email header analysisNew
-
Phishing and spam investigationNew
-
Tracing email originsNew
-
-
Module 15: Mobile Forensics3Lessons ·
-
Mobile device acquisition techniquesNew
-
iOS and Android forensicsNew
-
Mobile app investigationsNew
-
-
Module 16: IoT Forensics3Lessons ·
-
Challenges in IoT investigationsNew
-
Smart device forensicsNew
-
Vehicle forensicsNew
-
-
Module 17: Forensic Report Writing and Presentation3Lessons ·
-
Structuring a forensic reportNew
-
Legal considerations in reportingNew
-
Expert testimony preparationNew
-