CHFI
Responsable | KLEDIA Group |
---|---|
Dernière mise à jour | 30/05/2025 |
Membres | 1 |
-
Module 1: Computer Forensics in Today’s World4Leçons ·
-
Understanding computer forensicsNouveau
-
Cybercrime and its implicationsNouveau
-
Forensic investigation processNouveau
-
Legal and ethical issuesNouveau
-
-
Module 2: Computer Forensics Investigation Process3Leçons ·
-
Preparing for an investigationNouveau
-
Evidence acquisition and handlingNouveau
-
Data analysis and reportingNouveau
-
-
Module 3: Understanding Hard Disks and File Systems3Leçons ·
-
Hard disk architectureNouveau
-
File system overview (FAT, NTFS, EXT, etc.)Nouveau
-
Disk partitioning and boot processesNouveau
-
-
Module 4: Data Acquisition and Duplication3Leçons ·
-
Forensic imaging tools and techniquesNouveau
-
Write protection methodsNouveau
-
Validation and verification of dataNouveau
-
-
Module 5: Defeating Anti-Forensics Techniques3Leçons ·
-
Detection of data hiding (stenography, encryption, etc.)Nouveau
-
Handling encrypted filesNouveau
-
Dealing with password-protected filesNouveau
-
-
Module 6: Windows Forensics3Leçons ·
-
Windows artifacts (registry, event logs, prefetch, etc.)Nouveau
-
Memory forensicsNouveau
-
Timeline analysisNouveau
-
-
Module 7: Linux and Mac Forensics3Leçons ·
-
Linux file systems and artifactsNouveau
-
Mac OS X forensicsNouveau
-
Shell commands for forensic analysisNouveau
-
-
Module 8: Network Forensics3Leçons ·
-
Investigating network trafficNouveau
-
Log analysis (firewall, IDS/IPS, proxy)Nouveau
-
Wireless and cloud forensicsNouveau
-
-
Module 9: Investigating Web Attacks5Leçons ·
-
Web application attack forensicsNouveau
-
Investigating email crimesNouveau
-
Social media forensicsNouveau
-
Database log analysisNouveau
-
Cloud computing forensics challengesNouveau
-
-
Module 10: Dark Web Forensics3Leçons ·
-
Tor network investigationsNouveau
-
Cryptocurrency forensicsNouveau
-
Dark web evidence collectionNouveau
-
-
Module 11: Database Forensics2Leçons ·
-
Database attack investigationsNouveau
-
SQL injection forensicsNouveau
-
-
Module 12: Cloud Forensics2Leçons ·
-
Evidence collection from cloud environmentsNouveau
-
Legal aspects of cloud investigationsNouveau
-
-
Module 13: Malware Forensics3Leçons ·
-
Analyzing malicious softwareNouveau
-
Reverse engineering malwareNouveau
-
Memory forensics for malware detectionNouveau
-
-
Module 14: Investigating Email Crimes3Leçons ·
-
Email header analysisNouveau
-
Phishing and spam investigationNouveau
-
Tracing email originsNouveau
-
-
Module 15: Mobile Forensics3Leçons ·
-
Mobile device acquisition techniquesNouveau
-
iOS and Android forensicsNouveau
-
Mobile app investigationsNouveau
-
-
Module 16: IoT Forensics3Leçons ·
-
Challenges in IoT investigationsNouveau
-
Smart device forensicsNouveau
-
Vehicle forensicsNouveau
-
-
Module 17: Forensic Report Writing and Presentation3Leçons ·
-
Structuring a forensic reportNouveau
-
Legal considerations in reportingNouveau
-
Expert testimony preparationNouveau
-