CHFI
Ansvarig | KLEDIA Group |
---|---|
Senast uppdaterad | 2025-05-30 |
Medlemmar | 1 |
-
Module 1: Computer Forensics in Today’s World4Lektioner -
-
Understanding computer forensicsNy
-
Cybercrime and its implicationsNy
-
Forensic investigation processNy
-
Legal and ethical issuesNy
-
-
Module 2: Computer Forensics Investigation Process3Lektioner -
-
Preparing for an investigationNy
-
Evidence acquisition and handlingNy
-
Data analysis and reportingNy
-
-
Module 3: Understanding Hard Disks and File Systems3Lektioner -
-
Hard disk architectureNy
-
File system overview (FAT, NTFS, EXT, etc.)Ny
-
Disk partitioning and boot processesNy
-
-
Module 4: Data Acquisition and Duplication3Lektioner -
-
Forensic imaging tools and techniquesNy
-
Write protection methodsNy
-
Validation and verification of dataNy
-
-
Module 5: Defeating Anti-Forensics Techniques3Lektioner -
-
Detection of data hiding (stenography, encryption, etc.)Ny
-
Handling encrypted filesNy
-
Dealing with password-protected filesNy
-
-
Module 6: Windows Forensics3Lektioner -
-
Windows artifacts (registry, event logs, prefetch, etc.)Ny
-
Memory forensicsNy
-
Timeline analysisNy
-
-
Module 7: Linux and Mac Forensics3Lektioner -
-
Linux file systems and artifactsNy
-
Mac OS X forensicsNy
-
Shell commands for forensic analysisNy
-
-
Module 8: Network Forensics3Lektioner -
-
Investigating network trafficNy
-
Log analysis (firewall, IDS/IPS, proxy)Ny
-
Wireless and cloud forensicsNy
-
-
Module 9: Investigating Web Attacks5Lektioner -
-
Web application attack forensicsNy
-
Investigating email crimesNy
-
Social media forensicsNy
-
Database log analysisNy
-
Cloud computing forensics challengesNy
-
-
Module 10: Dark Web Forensics3Lektioner -
-
Tor network investigationsNy
-
Cryptocurrency forensicsNy
-
Dark web evidence collectionNy
-
-
Module 11: Database Forensics2Lektioner -
-
Database attack investigationsNy
-
SQL injection forensicsNy
-
-
Module 12: Cloud Forensics2Lektioner -
-
Evidence collection from cloud environmentsNy
-
Legal aspects of cloud investigationsNy
-
-
Module 13: Malware Forensics3Lektioner -
-
Analyzing malicious softwareNy
-
Reverse engineering malwareNy
-
Memory forensics for malware detectionNy
-
-
Module 14: Investigating Email Crimes3Lektioner -
-
Email header analysisNy
-
Phishing and spam investigationNy
-
Tracing email originsNy
-
-
Module 15: Mobile Forensics3Lektioner -
-
Mobile device acquisition techniquesNy
-
iOS and Android forensicsNy
-
Mobile app investigationsNy
-
-
Module 16: IoT Forensics3Lektioner -
-
Challenges in IoT investigationsNy
-
Smart device forensicsNy
-
Vehicle forensicsNy
-
-
Module 17: Forensic Report Writing and Presentation3Lektioner -
-
Structuring a forensic reportNy
-
Legal considerations in reportingNy
-
Expert testimony preparationNy
-