CHFI
Responsable | KLEDIA Group |
---|---|
Última actualización | 30/05/2025 |
Miembros | 1 |
-
Module 1: Computer Forensics in Today’s World4Lecciones ·
-
Understanding computer forensicsNuevo
-
Cybercrime and its implicationsNuevo
-
Forensic investigation processNuevo
-
Legal and ethical issuesNuevo
-
-
Module 2: Computer Forensics Investigation Process3Lecciones ·
-
Preparing for an investigationNuevo
-
Evidence acquisition and handlingNuevo
-
Data analysis and reportingNuevo
-
-
Module 3: Understanding Hard Disks and File Systems3Lecciones ·
-
Hard disk architectureNuevo
-
File system overview (FAT, NTFS, EXT, etc.)Nuevo
-
Disk partitioning and boot processesNuevo
-
-
Module 4: Data Acquisition and Duplication3Lecciones ·
-
Forensic imaging tools and techniquesNuevo
-
Write protection methodsNuevo
-
Validation and verification of dataNuevo
-
-
Module 5: Defeating Anti-Forensics Techniques3Lecciones ·
-
Detection of data hiding (stenography, encryption, etc.)Nuevo
-
Handling encrypted filesNuevo
-
Dealing with password-protected filesNuevo
-
-
Module 6: Windows Forensics3Lecciones ·
-
Windows artifacts (registry, event logs, prefetch, etc.)Nuevo
-
Memory forensicsNuevo
-
Timeline analysisNuevo
-
-
Module 7: Linux and Mac Forensics3Lecciones ·
-
Linux file systems and artifactsNuevo
-
Mac OS X forensicsNuevo
-
Shell commands for forensic analysisNuevo
-
-
Module 8: Network Forensics3Lecciones ·
-
Investigating network trafficNuevo
-
Log analysis (firewall, IDS/IPS, proxy)Nuevo
-
Wireless and cloud forensicsNuevo
-
-
Module 9: Investigating Web Attacks5Lecciones ·
-
Web application attack forensicsNuevo
-
Investigating email crimesNuevo
-
Social media forensicsNuevo
-
Database log analysisNuevo
-
Cloud computing forensics challengesNuevo
-
-
Module 10: Dark Web Forensics3Lecciones ·
-
Tor network investigationsNuevo
-
Cryptocurrency forensicsNuevo
-
Dark web evidence collectionNuevo
-
-
Module 11: Database Forensics2Lecciones ·
-
Database attack investigationsNuevo
-
SQL injection forensicsNuevo
-
-
Module 12: Cloud Forensics2Lecciones ·
-
Evidence collection from cloud environmentsNuevo
-
Legal aspects of cloud investigationsNuevo
-
-
Module 13: Malware Forensics3Lecciones ·
-
Analyzing malicious softwareNuevo
-
Reverse engineering malwareNuevo
-
Memory forensics for malware detectionNuevo
-
-
Module 14: Investigating Email Crimes3Lecciones ·
-
Email header analysisNuevo
-
Phishing and spam investigationNuevo
-
Tracing email originsNuevo
-
-
Module 15: Mobile Forensics3Lecciones ·
-
Mobile device acquisition techniquesNuevo
-
iOS and Android forensicsNuevo
-
Mobile app investigationsNuevo
-
-
Module 16: IoT Forensics3Lecciones ·
-
Challenges in IoT investigationsNuevo
-
Smart device forensicsNuevo
-
Vehicle forensicsNuevo
-
-
Module 17: Forensic Report Writing and Presentation3Lecciones ·
-
Structuring a forensic reportNuevo
-
Legal considerations in reportingNuevo
-
Expert testimony preparationNuevo
-