Odgovoran | KLEDIA Group |
---|---|
Zadnja promjena | 30.05.2025 |
Članovi | 1 |
-
Module 1: Computer Forensics in Today’s World4Lessons ·
-
Understanding computer forensicsNovi
-
Cybercrime and its implicationsNovi
-
Forensic investigation processNovi
-
Legal and ethical issuesNovi
-
-
Module 2: Computer Forensics Investigation Process3Lessons ·
-
Preparing for an investigationNovi
-
Evidence acquisition and handlingNovi
-
Data analysis and reportingNovi
-
-
Module 3: Understanding Hard Disks and File Systems3Lessons ·
-
Hard disk architectureNovi
-
File system overview (FAT, NTFS, EXT, etc.)Novi
-
Disk partitioning and boot processesNovi
-
-
Module 4: Data Acquisition and Duplication3Lessons ·
-
Forensic imaging tools and techniquesNovi
-
Write protection methodsNovi
-
Validation and verification of dataNovi
-
-
Module 5: Defeating Anti-Forensics Techniques3Lessons ·
-
Detection of data hiding (stenography, encryption, etc.)Novi
-
Handling encrypted filesNovi
-
Dealing with password-protected filesNovi
-
-
Module 6: Windows Forensics3Lessons ·
-
Windows artifacts (registry, event logs, prefetch, etc.)Novi
-
Memory forensicsNovi
-
Timeline analysisNovi
-
-
Module 7: Linux and Mac Forensics3Lessons ·
-
Linux file systems and artifactsNovi
-
Mac OS X forensicsNovi
-
Shell commands for forensic analysisNovi
-
-
Module 8: Network Forensics3Lessons ·
-
Investigating network trafficNovi
-
Log analysis (firewall, IDS/IPS, proxy)Novi
-
Wireless and cloud forensicsNovi
-
-
Module 9: Investigating Web Attacks5Lessons ·
-
Web application attack forensicsNovi
-
Investigating email crimesNovi
-
Social media forensicsNovi
-
Database log analysisNovi
-
Cloud computing forensics challengesNovi
-
-
Module 10: Dark Web Forensics3Lessons ·
-
Tor network investigationsNovi
-
Cryptocurrency forensicsNovi
-
Dark web evidence collectionNovi
-
-
Module 11: Database Forensics2Lessons ·
-
Database attack investigationsNovi
-
SQL injection forensicsNovi
-
-
Module 12: Cloud Forensics2Lessons ·
-
Evidence collection from cloud environmentsNovi
-
Legal aspects of cloud investigationsNovi
-
-
Module 13: Malware Forensics3Lessons ·
-
Analyzing malicious softwareNovi
-
Reverse engineering malwareNovi
-
Memory forensics for malware detectionNovi
-
-
Module 14: Investigating Email Crimes3Lessons ·
-
Email header analysisNovi
-
Phishing and spam investigationNovi
-
Tracing email originsNovi
-
-
Module 15: Mobile Forensics3Lessons ·
-
Mobile device acquisition techniquesNovi
-
iOS and Android forensicsNovi
-
Mobile app investigationsNovi
-
-
Module 16: IoT Forensics3Lessons ·
-
Challenges in IoT investigationsNovi
-
Smart device forensicsNovi
-
Vehicle forensicsNovi
-
-
Module 17: Forensic Report Writing and Presentation3Lessons ·
-
Structuring a forensic reportNovi
-
Legal considerations in reportingNovi
-
Expert testimony preparationNovi
-