Responsabil | KLEDIA Group |
---|---|
Ultima actualizare | 30.05.2025 |
Membri | 1 |
-
Module 1: Computer Forensics in Today’s World4Lecții ·
-
Understanding computer forensicsNou
-
Cybercrime and its implicationsNou
-
Forensic investigation processNou
-
Legal and ethical issuesNou
-
-
Module 2: Computer Forensics Investigation Process3Lecții ·
-
Preparing for an investigationNou
-
Evidence acquisition and handlingNou
-
Data analysis and reportingNou
-
-
Module 3: Understanding Hard Disks and File Systems3Lecții ·
-
Hard disk architectureNou
-
File system overview (FAT, NTFS, EXT, etc.)Nou
-
Disk partitioning and boot processesNou
-
-
Module 4: Data Acquisition and Duplication3Lecții ·
-
Forensic imaging tools and techniquesNou
-
Write protection methodsNou
-
Validation and verification of dataNou
-
-
Module 5: Defeating Anti-Forensics Techniques3Lecții ·
-
Detection of data hiding (stenography, encryption, etc.)Nou
-
Handling encrypted filesNou
-
Dealing with password-protected filesNou
-
-
Module 6: Windows Forensics3Lecții ·
-
Windows artifacts (registry, event logs, prefetch, etc.)Nou
-
Memory forensicsNou
-
Timeline analysisNou
-
-
Module 7: Linux and Mac Forensics3Lecții ·
-
Linux file systems and artifactsNou
-
Mac OS X forensicsNou
-
Shell commands for forensic analysisNou
-
-
Module 8: Network Forensics3Lecții ·
-
Investigating network trafficNou
-
Log analysis (firewall, IDS/IPS, proxy)Nou
-
Wireless and cloud forensicsNou
-
-
Module 9: Investigating Web Attacks5Lecții ·
-
Web application attack forensicsNou
-
Investigating email crimesNou
-
Social media forensicsNou
-
Database log analysisNou
-
Cloud computing forensics challengesNou
-
-
Module 10: Dark Web Forensics3Lecții ·
-
Tor network investigationsNou
-
Cryptocurrency forensicsNou
-
Dark web evidence collectionNou
-
-
Module 11: Database Forensics2Lecții ·
-
Database attack investigationsNou
-
SQL injection forensicsNou
-
-
Module 12: Cloud Forensics2Lecții ·
-
Evidence collection from cloud environmentsNou
-
Legal aspects of cloud investigationsNou
-
-
Module 13: Malware Forensics3Lecții ·
-
Analyzing malicious softwareNou
-
Reverse engineering malwareNou
-
Memory forensics for malware detectionNou
-
-
Module 14: Investigating Email Crimes3Lecții ·
-
Email header analysisNou
-
Phishing and spam investigationNou
-
Tracing email originsNou
-
-
Module 15: Mobile Forensics3Lecții ·
-
Mobile device acquisition techniquesNou
-
iOS and Android forensicsNou
-
Mobile app investigationsNou
-
-
Module 16: IoT Forensics3Lecții ·
-
Challenges in IoT investigationsNou
-
Smart device forensicsNou
-
Vehicle forensicsNou
-
-
Module 17: Forensic Report Writing and Presentation3Lecții ·
-
Structuring a forensic reportNou
-
Legal considerations in reportingNou
-
Expert testimony preparationNou
-