जिम्मेदार | KLEDIA Group |
---|---|
Last Update | शुक्रवार 30 मई 2025 |
Members | 1 |
-
Module 1: Computer Forensics in Today’s World4Lessons ·
-
Understanding computer forensicsनया
-
Cybercrime and its implicationsनया
-
Forensic investigation processनया
-
Legal and ethical issuesनया
-
-
Module 2: Computer Forensics Investigation Process3Lessons ·
-
Preparing for an investigationनया
-
Evidence acquisition and handlingनया
-
Data analysis and reportingनया
-
-
Module 3: Understanding Hard Disks and File Systems3Lessons ·
-
Hard disk architectureनया
-
File system overview (FAT, NTFS, EXT, etc.)नया
-
Disk partitioning and boot processesनया
-
-
Module 4: Data Acquisition and Duplication3Lessons ·
-
Forensic imaging tools and techniquesनया
-
Write protection methodsनया
-
Validation and verification of dataनया
-
-
Module 5: Defeating Anti-Forensics Techniques3Lessons ·
-
Detection of data hiding (stenography, encryption, etc.)नया
-
Handling encrypted filesनया
-
Dealing with password-protected filesनया
-
-
Module 6: Windows Forensics3Lessons ·
-
Windows artifacts (registry, event logs, prefetch, etc.)नया
-
Memory forensicsनया
-
Timeline analysisनया
-
-
Module 7: Linux and Mac Forensics3Lessons ·
-
Linux file systems and artifactsनया
-
Mac OS X forensicsनया
-
Shell commands for forensic analysisनया
-
-
Module 8: Network Forensics3Lessons ·
-
Investigating network trafficनया
-
Log analysis (firewall, IDS/IPS, proxy)नया
-
Wireless and cloud forensicsनया
-
-
Module 9: Investigating Web Attacks5Lessons ·
-
Web application attack forensicsनया
-
Investigating email crimesनया
-
Social media forensicsनया
-
Database log analysisनया
-
Cloud computing forensics challengesनया
-
-
Module 10: Dark Web Forensics3Lessons ·
-
Tor network investigationsनया
-
Cryptocurrency forensicsनया
-
Dark web evidence collectionनया
-
-
Module 11: Database Forensics2Lessons ·
-
Database attack investigationsनया
-
SQL injection forensicsनया
-
-
Module 12: Cloud Forensics2Lessons ·
-
Evidence collection from cloud environmentsनया
-
Legal aspects of cloud investigationsनया
-
-
Module 13: Malware Forensics3Lessons ·
-
Analyzing malicious softwareनया
-
Reverse engineering malwareनया
-
Memory forensics for malware detectionनया
-
-
Module 14: Investigating Email Crimes3Lessons ·
-
Email header analysisनया
-
Phishing and spam investigationनया
-
Tracing email originsनया
-
-
Module 15: Mobile Forensics3Lessons ·
-
Mobile device acquisition techniquesनया
-
iOS and Android forensicsनया
-
Mobile app investigationsनया
-
-
Module 16: IoT Forensics3Lessons ·
-
Challenges in IoT investigationsनया
-
Smart device forensicsनया
-
Vehicle forensicsनया
-
-
Module 17: Forensic Report Writing and Presentation3Lessons ·
-
Structuring a forensic reportनया
-
Legal considerations in reportingनया
-
Expert testimony preparationनया
-