Zodpovedný | KLEDIA Group |
---|---|
Posledná aktualizácia | 30.05.2025 |
Členovia | 1 |
-
Module 1: Computer Forensics in Today’s World4Lessons ·
-
Understanding computer forensicsNové
-
Cybercrime and its implicationsNové
-
Forensic investigation processNové
-
Legal and ethical issuesNové
-
-
Module 2: Computer Forensics Investigation Process3Lessons ·
-
Preparing for an investigationNové
-
Evidence acquisition and handlingNové
-
Data analysis and reportingNové
-
-
Module 3: Understanding Hard Disks and File Systems3Lessons ·
-
Hard disk architectureNové
-
File system overview (FAT, NTFS, EXT, etc.)Nové
-
Disk partitioning and boot processesNové
-
-
Module 4: Data Acquisition and Duplication3Lessons ·
-
Forensic imaging tools and techniquesNové
-
Write protection methodsNové
-
Validation and verification of dataNové
-
-
Module 5: Defeating Anti-Forensics Techniques3Lessons ·
-
Detection of data hiding (stenography, encryption, etc.)Nové
-
Handling encrypted filesNové
-
Dealing with password-protected filesNové
-
-
Module 6: Windows Forensics3Lessons ·
-
Windows artifacts (registry, event logs, prefetch, etc.)Nové
-
Memory forensicsNové
-
Timeline analysisNové
-
-
Module 7: Linux and Mac Forensics3Lessons ·
-
Linux file systems and artifactsNové
-
Mac OS X forensicsNové
-
Shell commands for forensic analysisNové
-
-
Module 8: Network Forensics3Lessons ·
-
Investigating network trafficNové
-
Log analysis (firewall, IDS/IPS, proxy)Nové
-
Wireless and cloud forensicsNové
-
-
Module 9: Investigating Web Attacks5Lessons ·
-
Web application attack forensicsNové
-
Investigating email crimesNové
-
Social media forensicsNové
-
Database log analysisNové
-
Cloud computing forensics challengesNové
-
-
Module 10: Dark Web Forensics3Lessons ·
-
Tor network investigationsNové
-
Cryptocurrency forensicsNové
-
Dark web evidence collectionNové
-
-
Module 11: Database Forensics2Lessons ·
-
Database attack investigationsNové
-
SQL injection forensicsNové
-
-
Module 12: Cloud Forensics2Lessons ·
-
Evidence collection from cloud environmentsNové
-
Legal aspects of cloud investigationsNové
-
-
Module 13: Malware Forensics3Lessons ·
-
Analyzing malicious softwareNové
-
Reverse engineering malwareNové
-
Memory forensics for malware detectionNové
-
-
Module 14: Investigating Email Crimes3Lessons ·
-
Email header analysisNové
-
Phishing and spam investigationNové
-
Tracing email originsNové
-
-
Module 15: Mobile Forensics3Lessons ·
-
Mobile device acquisition techniquesNové
-
iOS and Android forensicsNové
-
Mobile app investigationsNové
-
-
Module 16: IoT Forensics3Lessons ·
-
Challenges in IoT investigationsNové
-
Smart device forensicsNové
-
Vehicle forensicsNové
-
-
Module 17: Forensic Report Writing and Presentation3Lessons ·
-
Structuring a forensic reportNové
-
Legal considerations in reportingNové
-
Expert testimony preparationNové
-