Ответственный | KLEDIA Group |
---|---|
Последнее обновление | 30.05.2025 |
Участники | 1 |
-
Module 1: Computer Forensics in Today’s World4Уроки -
-
Understanding computer forensicsНовый
-
Cybercrime and its implicationsНовый
-
Forensic investigation processНовый
-
Legal and ethical issuesНовый
-
-
Module 2: Computer Forensics Investigation Process3Уроки -
-
Preparing for an investigationНовый
-
Evidence acquisition and handlingНовый
-
Data analysis and reportingНовый
-
-
Module 3: Understanding Hard Disks and File Systems3Уроки -
-
Hard disk architectureНовый
-
File system overview (FAT, NTFS, EXT, etc.)Новый
-
Disk partitioning and boot processesНовый
-
-
Module 4: Data Acquisition and Duplication3Уроки -
-
Forensic imaging tools and techniquesНовый
-
Write protection methodsНовый
-
Validation and verification of dataНовый
-
-
Module 5: Defeating Anti-Forensics Techniques3Уроки -
-
Detection of data hiding (stenography, encryption, etc.)Новый
-
Handling encrypted filesНовый
-
Dealing with password-protected filesНовый
-
-
Module 6: Windows Forensics3Уроки -
-
Windows artifacts (registry, event logs, prefetch, etc.)Новый
-
Memory forensicsНовый
-
Timeline analysisНовый
-
-
Module 7: Linux and Mac Forensics3Уроки -
-
Linux file systems and artifactsНовый
-
Mac OS X forensicsНовый
-
Shell commands for forensic analysisНовый
-
-
Module 8: Network Forensics3Уроки -
-
Investigating network trafficНовый
-
Log analysis (firewall, IDS/IPS, proxy)Новый
-
Wireless and cloud forensicsНовый
-
-
Module 9: Investigating Web Attacks5Уроки -
-
Web application attack forensicsНовый
-
Investigating email crimesНовый
-
Social media forensicsНовый
-
Database log analysisНовый
-
Cloud computing forensics challengesНовый
-
-
Module 10: Dark Web Forensics3Уроки -
-
Tor network investigationsНовый
-
Cryptocurrency forensicsНовый
-
Dark web evidence collectionНовый
-
-
Module 11: Database Forensics2Уроки -
-
Database attack investigationsНовый
-
SQL injection forensicsНовый
-
-
Module 12: Cloud Forensics2Уроки -
-
Evidence collection from cloud environmentsНовый
-
Legal aspects of cloud investigationsНовый
-
-
Module 13: Malware Forensics3Уроки -
-
Analyzing malicious softwareНовый
-
Reverse engineering malwareНовый
-
Memory forensics for malware detectionНовый
-
-
Module 14: Investigating Email Crimes3Уроки -
-
Email header analysisНовый
-
Phishing and spam investigationНовый
-
Tracing email originsНовый
-
-
Module 15: Mobile Forensics3Уроки -
-
Mobile device acquisition techniquesНовый
-
iOS and Android forensicsНовый
-
Mobile app investigationsНовый
-
-
Module 16: IoT Forensics3Уроки -
-
Challenges in IoT investigationsНовый
-
Smart device forensicsНовый
-
Vehicle forensicsНовый
-
-
Module 17: Forensic Report Writing and Presentation3Уроки -
-
Structuring a forensic reportНовый
-
Legal considerations in reportingНовый
-
Expert testimony preparationНовый
-