Sorumlu | KLEDIA Group |
---|---|
Son Güncelleme | 30-05-2025 |
Üyeler | 1 |
-
Module 1: Computer Forensics in Today’s World4Lessons ·
-
Understanding computer forensicsYeni
-
Cybercrime and its implicationsYeni
-
Forensic investigation processYeni
-
Legal and ethical issuesYeni
-
-
Module 2: Computer Forensics Investigation Process3Lessons ·
-
Preparing for an investigationYeni
-
Evidence acquisition and handlingYeni
-
Data analysis and reportingYeni
-
-
Module 3: Understanding Hard Disks and File Systems3Lessons ·
-
Hard disk architectureYeni
-
File system overview (FAT, NTFS, EXT, etc.)Yeni
-
Disk partitioning and boot processesYeni
-
-
Module 4: Data Acquisition and Duplication3Lessons ·
-
Forensic imaging tools and techniquesYeni
-
Write protection methodsYeni
-
Validation and verification of dataYeni
-
-
Module 5: Defeating Anti-Forensics Techniques3Lessons ·
-
Detection of data hiding (stenography, encryption, etc.)Yeni
-
Handling encrypted filesYeni
-
Dealing with password-protected filesYeni
-
-
Module 6: Windows Forensics3Lessons ·
-
Windows artifacts (registry, event logs, prefetch, etc.)Yeni
-
Memory forensicsYeni
-
Timeline analysisYeni
-
-
Module 7: Linux and Mac Forensics3Lessons ·
-
Linux file systems and artifactsYeni
-
Mac OS X forensicsYeni
-
Shell commands for forensic analysisYeni
-
-
Module 8: Network Forensics3Lessons ·
-
Investigating network trafficYeni
-
Log analysis (firewall, IDS/IPS, proxy)Yeni
-
Wireless and cloud forensicsYeni
-
-
Module 9: Investigating Web Attacks5Lessons ·
-
Web application attack forensicsYeni
-
Investigating email crimesYeni
-
Social media forensicsYeni
-
Database log analysisYeni
-
Cloud computing forensics challengesYeni
-
-
Module 10: Dark Web Forensics3Lessons ·
-
Tor network investigationsYeni
-
Cryptocurrency forensicsYeni
-
Dark web evidence collectionYeni
-
-
Module 11: Database Forensics2Lessons ·
-
Database attack investigationsYeni
-
SQL injection forensicsYeni
-
-
Module 12: Cloud Forensics2Lessons ·
-
Evidence collection from cloud environmentsYeni
-
Legal aspects of cloud investigationsYeni
-
-
Module 13: Malware Forensics3Lessons ·
-
Analyzing malicious softwareYeni
-
Reverse engineering malwareYeni
-
Memory forensics for malware detectionYeni
-
-
Module 14: Investigating Email Crimes3Lessons ·
-
Email header analysisYeni
-
Phishing and spam investigationYeni
-
Tracing email originsYeni
-
-
Module 15: Mobile Forensics3Lessons ·
-
Mobile device acquisition techniquesYeni
-
iOS and Android forensicsYeni
-
Mobile app investigationsYeni
-
-
Module 16: IoT Forensics3Lessons ·
-
Challenges in IoT investigationsYeni
-
Smart device forensicsYeni
-
Vehicle forensicsYeni
-
-
Module 17: Forensic Report Writing and Presentation3Lessons ·
-
Structuring a forensic reportYeni
-
Legal considerations in reportingYeni
-
Expert testimony preparationYeni
-