担当者 | KLEDIA Group |
---|---|
最終更新 | 2025年05月30日 |
メンバー | 1 |
-
Module 1: Computer Forensics in Today’s World4レッスン ·
-
Understanding computer forensics
-
Cybercrime and its implications
-
Forensic investigation process
-
Legal and ethical issues
-
-
Module 2: Computer Forensics Investigation Process3レッスン ·
-
Preparing for an investigation
-
Evidence acquisition and handling
-
Data analysis and reporting
-
-
Module 3: Understanding Hard Disks and File Systems3レッスン ·
-
Hard disk architecture
-
File system overview (FAT, NTFS, EXT, etc.)
-
Disk partitioning and boot processes
-
-
Module 4: Data Acquisition and Duplication3レッスン ·
-
Forensic imaging tools and techniques
-
Write protection methods
-
Validation and verification of data
-
-
Module 5: Defeating Anti-Forensics Techniques3レッスン ·
-
Detection of data hiding (stenography, encryption, etc.)
-
Handling encrypted files
-
Dealing with password-protected files
-
-
Module 6: Windows Forensics3レッスン ·
-
Windows artifacts (registry, event logs, prefetch, etc.)
-
Memory forensics
-
Timeline analysis
-
-
Module 7: Linux and Mac Forensics3レッスン ·
-
Linux file systems and artifacts
-
Mac OS X forensics
-
Shell commands for forensic analysis
-
-
Module 8: Network Forensics3レッスン ·
-
Investigating network traffic
-
Log analysis (firewall, IDS/IPS, proxy)
-
Wireless and cloud forensics
-
-
Module 9: Investigating Web Attacks5レッスン ·
-
Web application attack forensics
-
Investigating email crimes
-
Social media forensics
-
Database log analysis
-
Cloud computing forensics challenges
-
-
Module 10: Dark Web Forensics3レッスン ·
-
Tor network investigations
-
Cryptocurrency forensics
-
Dark web evidence collection
-
-
Module 11: Database Forensics2レッスン ·
-
Database attack investigations
-
SQL injection forensics
-
-
Module 12: Cloud Forensics2レッスン ·
-
Evidence collection from cloud environments
-
Legal aspects of cloud investigations
-
-
Module 13: Malware Forensics3レッスン ·
-
Analyzing malicious software
-
Reverse engineering malware
-
Memory forensics for malware detection
-
-
Module 14: Investigating Email Crimes3レッスン ·
-
Email header analysis
-
Phishing and spam investigation
-
Tracing email origins
-
-
Module 15: Mobile Forensics3レッスン ·
-
Mobile device acquisition techniques
-
iOS and Android forensics
-
Mobile app investigations
-
-
Module 16: IoT Forensics3レッスン ·
-
Challenges in IoT investigations
-
Smart device forensics
-
Vehicle forensics
-
-
Module 17: Forensic Report Writing and Presentation3レッスン ·
-
Structuring a forensic report
-
Legal considerations in reporting
-
Expert testimony preparation
-