Atsakingas | KLEDIA Group |
---|---|
Paskutinis atnaujinimas | 2025-05-30 |
Nariai | 1 |
-
Module 1: Computer Forensics in Today’s World4Pamokos ·
-
Understanding computer forensicsNaujas
-
Cybercrime and its implicationsNaujas
-
Forensic investigation processNaujas
-
Legal and ethical issuesNaujas
-
-
Module 2: Computer Forensics Investigation Process3Pamokos ·
-
Preparing for an investigationNaujas
-
Evidence acquisition and handlingNaujas
-
Data analysis and reportingNaujas
-
-
Module 3: Understanding Hard Disks and File Systems3Pamokos ·
-
Hard disk architectureNaujas
-
File system overview (FAT, NTFS, EXT, etc.)Naujas
-
Disk partitioning and boot processesNaujas
-
-
Module 4: Data Acquisition and Duplication3Pamokos ·
-
Forensic imaging tools and techniquesNaujas
-
Write protection methodsNaujas
-
Validation and verification of dataNaujas
-
-
Module 5: Defeating Anti-Forensics Techniques3Pamokos ·
-
Detection of data hiding (stenography, encryption, etc.)Naujas
-
Handling encrypted filesNaujas
-
Dealing with password-protected filesNaujas
-
-
Module 6: Windows Forensics3Pamokos ·
-
Windows artifacts (registry, event logs, prefetch, etc.)Naujas
-
Memory forensicsNaujas
-
Timeline analysisNaujas
-
-
Module 7: Linux and Mac Forensics3Pamokos ·
-
Linux file systems and artifactsNaujas
-
Mac OS X forensicsNaujas
-
Shell commands for forensic analysisNaujas
-
-
Module 8: Network Forensics3Pamokos ·
-
Investigating network trafficNaujas
-
Log analysis (firewall, IDS/IPS, proxy)Naujas
-
Wireless and cloud forensicsNaujas
-
-
Module 9: Investigating Web Attacks5Pamokos ·
-
Web application attack forensicsNaujas
-
Investigating email crimesNaujas
-
Social media forensicsNaujas
-
Database log analysisNaujas
-
Cloud computing forensics challengesNaujas
-
-
Module 10: Dark Web Forensics3Pamokos ·
-
Tor network investigationsNaujas
-
Cryptocurrency forensicsNaujas
-
Dark web evidence collectionNaujas
-
-
Module 11: Database Forensics2Pamokos ·
-
Database attack investigationsNaujas
-
SQL injection forensicsNaujas
-
-
Module 12: Cloud Forensics2Pamokos ·
-
Evidence collection from cloud environmentsNaujas
-
Legal aspects of cloud investigationsNaujas
-
-
Module 13: Malware Forensics3Pamokos ·
-
Analyzing malicious softwareNaujas
-
Reverse engineering malwareNaujas
-
Memory forensics for malware detectionNaujas
-
-
Module 14: Investigating Email Crimes3Pamokos ·
-
Email header analysisNaujas
-
Phishing and spam investigationNaujas
-
Tracing email originsNaujas
-
-
Module 15: Mobile Forensics3Pamokos ·
-
Mobile device acquisition techniquesNaujas
-
iOS and Android forensicsNaujas
-
Mobile app investigationsNaujas
-
-
Module 16: IoT Forensics3Pamokos ·
-
Challenges in IoT investigationsNaujas
-
Smart device forensicsNaujas
-
Vehicle forensicsNaujas
-
-
Module 17: Forensic Report Writing and Presentation3Pamokos ·
-
Structuring a forensic reportNaujas
-
Legal considerations in reportingNaujas
-
Expert testimony preparationNaujas
-