CHFI
Odgovoren | KLEDIA Group |
---|---|
Zadnja posodobitev | 30. 05. 2025 |
Člani | 1 |
-
Module 1: Computer Forensics in Today’s World4Lessons ·
-
Understanding computer forensicsNovo
-
Cybercrime and its implicationsNovo
-
Forensic investigation processNovo
-
Legal and ethical issuesNovo
-
-
Module 2: Computer Forensics Investigation Process3Lessons ·
-
Preparing for an investigationNovo
-
Evidence acquisition and handlingNovo
-
Data analysis and reportingNovo
-
-
Module 3: Understanding Hard Disks and File Systems3Lessons ·
-
Hard disk architectureNovo
-
File system overview (FAT, NTFS, EXT, etc.)Novo
-
Disk partitioning and boot processesNovo
-
-
Module 4: Data Acquisition and Duplication3Lessons ·
-
Forensic imaging tools and techniquesNovo
-
Write protection methodsNovo
-
Validation and verification of dataNovo
-
-
Module 5: Defeating Anti-Forensics Techniques3Lessons ·
-
Detection of data hiding (stenography, encryption, etc.)Novo
-
Handling encrypted filesNovo
-
Dealing with password-protected filesNovo
-
-
Module 6: Windows Forensics3Lessons ·
-
Windows artifacts (registry, event logs, prefetch, etc.)Novo
-
Memory forensicsNovo
-
Timeline analysisNovo
-
-
Module 7: Linux and Mac Forensics3Lessons ·
-
Linux file systems and artifactsNovo
-
Mac OS X forensicsNovo
-
Shell commands for forensic analysisNovo
-
-
Module 8: Network Forensics3Lessons ·
-
Investigating network trafficNovo
-
Log analysis (firewall, IDS/IPS, proxy)Novo
-
Wireless and cloud forensicsNovo
-
-
Module 9: Investigating Web Attacks5Lessons ·
-
Web application attack forensicsNovo
-
Investigating email crimesNovo
-
Social media forensicsNovo
-
Database log analysisNovo
-
Cloud computing forensics challengesNovo
-
-
Module 10: Dark Web Forensics3Lessons ·
-
Tor network investigationsNovo
-
Cryptocurrency forensicsNovo
-
Dark web evidence collectionNovo
-
-
Module 11: Database Forensics2Lessons ·
-
Database attack investigationsNovo
-
SQL injection forensicsNovo
-
-
Module 12: Cloud Forensics2Lessons ·
-
Evidence collection from cloud environmentsNovo
-
Legal aspects of cloud investigationsNovo
-
-
Module 13: Malware Forensics3Lessons ·
-
Analyzing malicious softwareNovo
-
Reverse engineering malwareNovo
-
Memory forensics for malware detectionNovo
-
-
Module 14: Investigating Email Crimes3Lessons ·
-
Email header analysisNovo
-
Phishing and spam investigationNovo
-
Tracing email originsNovo
-
-
Module 15: Mobile Forensics3Lessons ·
-
Mobile device acquisition techniquesNovo
-
iOS and Android forensicsNovo
-
Mobile app investigationsNovo
-
-
Module 16: IoT Forensics3Lessons ·
-
Challenges in IoT investigationsNovo
-
Smart device forensicsNovo
-
Vehicle forensicsNovo
-
-
Module 17: Forensic Report Writing and Presentation3Lessons ·
-
Structuring a forensic reportNovo
-
Legal considerations in reportingNovo
-
Expert testimony preparationNovo
-