CHFI
Penanggung Jawab | KLEDIA Group |
---|---|
Terakhir diperbarui | 30/05/2025 |
Anggota | 1 |
-
Module 1: Computer Forensics in Today’s World4Pelajaran ·
-
Understanding computer forensicsBaru
-
Cybercrime and its implicationsBaru
-
Forensic investigation processBaru
-
Legal and ethical issuesBaru
-
-
Module 2: Computer Forensics Investigation Process3Pelajaran ·
-
Preparing for an investigationBaru
-
Evidence acquisition and handlingBaru
-
Data analysis and reportingBaru
-
-
Module 3: Understanding Hard Disks and File Systems3Pelajaran ·
-
Hard disk architectureBaru
-
File system overview (FAT, NTFS, EXT, etc.)Baru
-
Disk partitioning and boot processesBaru
-
-
Module 4: Data Acquisition and Duplication3Pelajaran ·
-
Forensic imaging tools and techniquesBaru
-
Write protection methodsBaru
-
Validation and verification of dataBaru
-
-
Module 5: Defeating Anti-Forensics Techniques3Pelajaran ·
-
Detection of data hiding (stenography, encryption, etc.)Baru
-
Handling encrypted filesBaru
-
Dealing with password-protected filesBaru
-
-
Module 6: Windows Forensics3Pelajaran ·
-
Windows artifacts (registry, event logs, prefetch, etc.)Baru
-
Memory forensicsBaru
-
Timeline analysisBaru
-
-
Module 7: Linux and Mac Forensics3Pelajaran ·
-
Linux file systems and artifactsBaru
-
Mac OS X forensicsBaru
-
Shell commands for forensic analysisBaru
-
-
Module 8: Network Forensics3Pelajaran ·
-
Investigating network trafficBaru
-
Log analysis (firewall, IDS/IPS, proxy)Baru
-
Wireless and cloud forensicsBaru
-
-
Module 9: Investigating Web Attacks5Pelajaran ·
-
Web application attack forensicsBaru
-
Investigating email crimesBaru
-
Social media forensicsBaru
-
Database log analysisBaru
-
Cloud computing forensics challengesBaru
-
-
Module 10: Dark Web Forensics3Pelajaran ·
-
Tor network investigationsBaru
-
Cryptocurrency forensicsBaru
-
Dark web evidence collectionBaru
-
-
Module 11: Database Forensics2Pelajaran ·
-
Database attack investigationsBaru
-
SQL injection forensicsBaru
-
-
Module 12: Cloud Forensics2Pelajaran ·
-
Evidence collection from cloud environmentsBaru
-
Legal aspects of cloud investigationsBaru
-
-
Module 13: Malware Forensics3Pelajaran ·
-
Analyzing malicious softwareBaru
-
Reverse engineering malwareBaru
-
Memory forensics for malware detectionBaru
-
-
Module 14: Investigating Email Crimes3Pelajaran ·
-
Email header analysisBaru
-
Phishing and spam investigationBaru
-
Tracing email originsBaru
-
-
Module 15: Mobile Forensics3Pelajaran ·
-
Mobile device acquisition techniquesBaru
-
iOS and Android forensicsBaru
-
Mobile app investigationsBaru
-
-
Module 16: IoT Forensics3Pelajaran ·
-
Challenges in IoT investigationsBaru
-
Smart device forensicsBaru
-
Vehicle forensicsBaru
-
-
Module 17: Forensic Report Writing and Presentation3Pelajaran ·
-
Structuring a forensic reportBaru
-
Legal considerations in reportingBaru
-
Expert testimony preparationBaru
-