Vastuuhenkilö | KLEDIA Group |
---|---|
Viimeinen päivitys | 30.05.2025 |
Jäsenet | 1 |
-
Module 1: Computer Forensics in Today’s World4Oppitunnit -
-
Understanding computer forensicsUusi
-
Cybercrime and its implicationsUusi
-
Forensic investigation processUusi
-
Legal and ethical issuesUusi
-
-
Module 2: Computer Forensics Investigation Process3Oppitunnit -
-
Preparing for an investigationUusi
-
Evidence acquisition and handlingUusi
-
Data analysis and reportingUusi
-
-
Module 3: Understanding Hard Disks and File Systems3Oppitunnit -
-
Hard disk architectureUusi
-
File system overview (FAT, NTFS, EXT, etc.)Uusi
-
Disk partitioning and boot processesUusi
-
-
Module 4: Data Acquisition and Duplication3Oppitunnit -
-
Forensic imaging tools and techniquesUusi
-
Write protection methodsUusi
-
Validation and verification of dataUusi
-
-
Module 5: Defeating Anti-Forensics Techniques3Oppitunnit -
-
Detection of data hiding (stenography, encryption, etc.)Uusi
-
Handling encrypted filesUusi
-
Dealing with password-protected filesUusi
-
-
Module 6: Windows Forensics3Oppitunnit -
-
Windows artifacts (registry, event logs, prefetch, etc.)Uusi
-
Memory forensicsUusi
-
Timeline analysisUusi
-
-
Module 7: Linux and Mac Forensics3Oppitunnit -
-
Linux file systems and artifactsUusi
-
Mac OS X forensicsUusi
-
Shell commands for forensic analysisUusi
-
-
Module 8: Network Forensics3Oppitunnit -
-
Investigating network trafficUusi
-
Log analysis (firewall, IDS/IPS, proxy)Uusi
-
Wireless and cloud forensicsUusi
-
-
Module 9: Investigating Web Attacks5Oppitunnit -
-
Web application attack forensicsUusi
-
Investigating email crimesUusi
-
Social media forensicsUusi
-
Database log analysisUusi
-
Cloud computing forensics challengesUusi
-
-
Module 10: Dark Web Forensics3Oppitunnit -
-
Tor network investigationsUusi
-
Cryptocurrency forensicsUusi
-
Dark web evidence collectionUusi
-
-
Module 11: Database Forensics2Oppitunnit -
-
Database attack investigationsUusi
-
SQL injection forensicsUusi
-
-
Module 12: Cloud Forensics2Oppitunnit -
-
Evidence collection from cloud environmentsUusi
-
Legal aspects of cloud investigationsUusi
-
-
Module 13: Malware Forensics3Oppitunnit -
-
Analyzing malicious softwareUusi
-
Reverse engineering malwareUusi
-
Memory forensics for malware detectionUusi
-
-
Module 14: Investigating Email Crimes3Oppitunnit -
-
Email header analysisUusi
-
Phishing and spam investigationUusi
-
Tracing email originsUusi
-
-
Module 15: Mobile Forensics3Oppitunnit -
-
Mobile device acquisition techniquesUusi
-
iOS and Android forensicsUusi
-
Mobile app investigationsUusi
-
-
Module 16: IoT Forensics3Oppitunnit -
-
Challenges in IoT investigationsUusi
-
Smart device forensicsUusi
-
Vehicle forensicsUusi
-
-
Module 17: Forensic Report Writing and Presentation3Oppitunnit -
-
Structuring a forensic reportUusi
-
Legal considerations in reportingUusi
-
Expert testimony preparationUusi
-