CHFI
Verantwoordelijke | KLEDIA Group |
---|---|
Laatst bijgewerkt | 30-05-2025 |
Leden | 1 |
-
Module 1: Computer Forensics in Today’s World4Lessen ·
-
Understanding computer forensicsNieuw
-
Cybercrime and its implicationsNieuw
-
Forensic investigation processNieuw
-
Legal and ethical issuesNieuw
-
-
Module 2: Computer Forensics Investigation Process3Lessen ·
-
Preparing for an investigationNieuw
-
Evidence acquisition and handlingNieuw
-
Data analysis and reportingNieuw
-
-
Module 3: Understanding Hard Disks and File Systems3Lessen ·
-
Hard disk architectureNieuw
-
File system overview (FAT, NTFS, EXT, etc.)Nieuw
-
Disk partitioning and boot processesNieuw
-
-
Module 4: Data Acquisition and Duplication3Lessen ·
-
Forensic imaging tools and techniquesNieuw
-
Write protection methodsNieuw
-
Validation and verification of dataNieuw
-
-
Module 5: Defeating Anti-Forensics Techniques3Lessen ·
-
Detection of data hiding (stenography, encryption, etc.)Nieuw
-
Handling encrypted filesNieuw
-
Dealing with password-protected filesNieuw
-
-
Module 6: Windows Forensics3Lessen ·
-
Windows artifacts (registry, event logs, prefetch, etc.)Nieuw
-
Memory forensicsNieuw
-
Timeline analysisNieuw
-
-
Module 7: Linux and Mac Forensics3Lessen ·
-
Linux file systems and artifactsNieuw
-
Mac OS X forensicsNieuw
-
Shell commands for forensic analysisNieuw
-
-
Module 8: Network Forensics3Lessen ·
-
Investigating network trafficNieuw
-
Log analysis (firewall, IDS/IPS, proxy)Nieuw
-
Wireless and cloud forensicsNieuw
-
-
Module 9: Investigating Web Attacks5Lessen ·
-
Web application attack forensicsNieuw
-
Investigating email crimesNieuw
-
Social media forensicsNieuw
-
Database log analysisNieuw
-
Cloud computing forensics challengesNieuw
-
-
Module 10: Dark Web Forensics3Lessen ·
-
Tor network investigationsNieuw
-
Cryptocurrency forensicsNieuw
-
Dark web evidence collectionNieuw
-
-
Module 11: Database Forensics2Lessen ·
-
Database attack investigationsNieuw
-
SQL injection forensicsNieuw
-
-
Module 12: Cloud Forensics2Lessen ·
-
Evidence collection from cloud environmentsNieuw
-
Legal aspects of cloud investigationsNieuw
-
-
Module 13: Malware Forensics3Lessen ·
-
Analyzing malicious softwareNieuw
-
Reverse engineering malwareNieuw
-
Memory forensics for malware detectionNieuw
-
-
Module 14: Investigating Email Crimes3Lessen ·
-
Email header analysisNieuw
-
Phishing and spam investigationNieuw
-
Tracing email originsNieuw
-
-
Module 15: Mobile Forensics3Lessen ·
-
Mobile device acquisition techniquesNieuw
-
iOS and Android forensicsNieuw
-
Mobile app investigationsNieuw
-
-
Module 16: IoT Forensics3Lessen ·
-
Challenges in IoT investigationsNieuw
-
Smart device forensicsNieuw
-
Vehicle forensicsNieuw
-
-
Module 17: Forensic Report Writing and Presentation3Lessen ·
-
Structuring a forensic reportNieuw
-
Legal considerations in reportingNieuw
-
Expert testimony preparationNieuw
-