Module 1 | Introduction | |
---|---|---|
Unit 1 | 01 - Introduction | |
Module 2 | Computer Forensics in Todays World | |
Unit 1 | 01 - Computer Forensics in Todays World | |
Unit 2 | 02 - Forensics Science | |
Unit 3 | 03 - Forensics Readiness | |
Unit 4 | 04 - Cyber Crime | |
Unit 5 | 05 - Cyber Crime Investigation | |
Unit 6 | 06 - Cyber Crime Investigation 02 | |
Unit 7 | 07 - Corporate Investigations | |
Unit 8 | 08 - Reporting a Cyber Crime | |
Unit 9 | 09 - Close | |
Module 3 | Computer Forensics Investigation Process | |
Unit 1 | 01 - Computer Forensics Investigation Process | |
Unit 2 | 02 - Before the Investigation | |
Unit 3 | 03 - Build a Forensics Workstation | |
Unit 4 | 04 - Building the Investigation Team | |
Unit 5 | 05 - Acquire Authorisation | |
Unit 6 | 06 - Obtain Search Warrant | |
Unit 7 | 07 - First Responder | |
Unit 8 | 08 - Collect Physical Evidence | |
Unit 9 | 09 - Collect Electronic Evidence | |
Unit 10 | 10 - Secure the Evidence | |
Unit 11 | 11 - Chain of Custody | |
Unit 12 | 12 - Imaging | |
Unit 13 | 13 - Data Analysis | |
Unit 14 | 14 - Investigation Report | |
Unit 15 | 15 - Expert Witness | |
Unit 16 | 16 - Professional Conduct | |
Unit 17 | 17 - Close | |
Module 4 | Digital Evidence | |
Unit 1 | 01 - Digital Evidence | |
Unit 2 | 02 - Increasing Awareness | |
Unit 3 | 03 - Increasing Awareness 02 | |
Unit 4 | 04 - Anti-Digital Forensics | |
Unit 5 | 05 - Digital Data | |
Unit 6 | 06 - Rules of Evidence | |
Unit 7 | 07 - International Organisation on Computer Evidence | |
Unit 8 | 08 - Electronic Devices | |
Unit 9 | 09 - Examination Process | |
Unit 10 | 10 - Evidence Assessment | |
Unit 11 | 11 - Evidence Acquisition | |
Unit 12 | 12 - Evidence Acquisition 02 | |
Unit 13 | 13 - Evidence Acquisition 03 | |
Unit 14 | 14 - Evidence Preservation | |
Unit 15 | 15 - Evidence Examination and Analysis | |
Unit 16 | 16 - Evidence Documentation and Reporting | |
Unit 17 | 17 - Close | |
Module 5 | First Responder Procedures | |
Unit 1 | 01 - First Responder Procedures | |
Unit 2 | 02 - Electronic Evidence | |
Unit 3 | 03 - Roles of First Responder | |
Unit 4 | 04 - Evidence Collecting | |
Unit 5 | 05 - Initial Search | |
Unit 6 | 06 - Collecting and Preserving Electronic Evidence | |
Unit 7 | 07 - Collecting and Preserving Electronic Evidence 02 | |
Unit 8 | 08 - Common Mistakes | |
Unit 9 | 09 - Close | |
Module 6 | Computer Forensics Lab | |
Unit 1 | 01 - Computer Forensics Lab | |
Unit 2 | 02 - Planning for a Forensics Lab | |
Unit 3 | 03 - Licensing | |
Unit 4 | 04 - Investigative Services | |
Unit 5 | 05 - Equipment | |
Unit 6 | 06 - Software | |
Unit 7 | 07 - Close | |
Module 7 | Understanding Hard Disks and File Systems | |
Unit 1 | 01 - Understanding Hard Disks and File Systems | |
Unit 2 | 02 - Disk Drives | |
Unit 3 | 03 - Cluster | |
Unit 4 | 04 - Slack Space | |
Unit 5 | 05 - Disk Partitions | |
Unit 6 | 06 - Master Boot Record | |
Unit 7 | 07 - Boot Process | |
Unit 8 | 08 - File Systems | |
Unit 9 | 09 - Windows File Systems | |
Unit 10 | 10 - Linux File Systems | |
Unit 11 | 11 - Mac OS X File Systems | |
Unit 12 | 12 - RAID Storage System | |
Unit 13 | 13 - File Carving Process | |
Unit 14 | 14 - Close | |
Module 8 | Windows Forensics | |
Unit 1 | 01 - Windows Forensics | |
Unit 2 | 02 - Volatile Information | |
Unit 3 | 03 - System Time | |
Unit 4 | 04 - Network Information | |
Unit 5 | 05 - Process Memory | |
Unit 6 | 06 - Non-Volatile Information | |
Unit 7 | 07 - Slack Space Continued | |
Unit 8 | 08 - Collecting Hidden Partition Information | |
Unit 9 | 09 - Memory Dump | |
Unit 10 | 10 - Extracting the Process Image | |
Unit 11 | 11 - Inside the Registry | |
Unit 12 | 12 - Time Zone Information | |
Unit 13 | 13 - Wireless SSIDs | |
Unit 14 | 14 - Mounted Devices | |
Unit 15 | 15 - Cache, Cookie and History Analysis in IE | |
Unit 16 | 16 - MD5 | |
Unit 17 | 17 - Recycle Bin | |
Unit 18 | 18 - Prefetch Files | |
Unit 19 | 19 - Executable File Analysis | |
Unit 20 | 20 - PE Header Analysis | |
Unit 21 | 21 - Metadata | |
Unit 22 | 22 - Events | |
Unit 23 | 23 - Windows Password Storage | |
Unit 24 | 24 - Windows Forensics Tool | |
Unit 25 | 25 - Close | |
Module 9 | Data Acquisition and Duplication | |
Unit 1 | 01 - Data Acquisition and Duplication | |
Unit 2 | 02 - Formats | |
Unit 3 | 03 - Methods | |
Unit 4 | 04 - Mistakes | |
Unit 5 | 05 - Static Data | |
Unit 6 | 06 - Live Data | |
Unit 7 | 07 - Disk Imaging Tool Requirements | |
Unit 8 | 08 - Validating Data Acquisitions | |
Unit 9 | 09 - Remote Data Acquisitions | |
Unit 10 | 10 - Best Practices | |
Unit 11 | 11 - Close | |
Module 10 | Recovering Deleted Files and Deleted Partitions | |
Unit 1 | 01 - Recovering Deleted Files and Deleted Partitions | |
Unit 2 | 02 - Deleting Files | |
Unit 3 | 03 - Recycle Bin Continued | |
Unit 4 | 04 - File Recovery in Mac OS X | |
Unit 5 | 05 - File Recovery in Linux | |
Unit 6 | 06 - Close | |
Module 11 | Using AccessData FTK 02 | |
Unit 1 | 01 - Using AccessData FTK | |
Unit 2 | 02 - Using AccessData FTK 02 | |
Module 12 | Steganography and Image File Forensics | |
Unit 1 | 01 - Steganography and Image File Forensics | |
Unit 2 | 02 - What is Steganography | |
Unit 3 | 03 - Steganography Techniques | |
Unit 4 | 04 - Steganography Techniques 02 | |
Unit 5 | 05 - Steganalysis | |
Unit 6 | 06 - Close | |
Module 13 | Application Password Crackers | |
Unit 1 | 01 - Application Password Crackers | |
Unit 2 | 02 - Terminology | |
Unit 3 | 03 - Password Cracker | |
Unit 4 | 04 - Password Cracking Techniques | |
Unit 5 | 05 - Active Online Attack | |
Unit 6 | 06 - Non-Electronic Attacks | |
Unit 7 | 07 - System Software Password Cracking | |
Unit 8 | 08 - Close | |
Module 14 | Log Capturing and Event Correlation | |
Unit 1 | 01 - Log Capturing and Event Correlation | |
Unit 2 | 02 - Computer Security Logs | |
Unit 3 | 03 - Router Log Files | |
Unit 4 | 04 - Configuring Windows Logging | |
Unit 5 | 05 - Log File Accuracy | |
Unit 6 | 06 - Keeping Time | |
Unit 7 | 07 - UTC Time | |
Unit 8 | 08 - Legality of Using Logs | |
Unit 9 | 09 - Laws and Regulations | |
Unit 10 | 10 - Log Management | |
Unit 11 | 11 - Centralised Logging | |
Unit 12 | 12 - Syslog | |
Unit 13 | 13 - Event Correlation | |
Unit 14 | 14 - Close | |
Module 15 | Network Forensics and Investigating Network Traffic | |
Unit 1 | 01 - Network Forensics and Investigating Network Traffic | |
Unit 2 | 02 - Intrusion Detection Systems | |
Unit 3 | 03 - IP Address Spoofing | |
Unit 4 | 04 - Denial of Service | |
Unit 5 | 05 - Trojan Horse | |
Unit 6 | 06 - Injection Attacks | |
Unit 7 | 07 - Postmortem and Real Time Analysis | |
Unit 8 | 08 - Close | |
Module 16 | Investigating Wireless Attacks | |
Unit 1 | 01 - Investigating Wireless Attacks | |
Unit 2 | 02 - Wireless Standards | |
Unit 3 | 03 - Service Set Identifier | |
Unit 4 | 04 - Types of Wireless Encryption | |
Unit 5 | 05 - Wi-Fi Chalking | |
Unit 6 | 06 - Availibility Attacks | |
Unit 7 | 07 - Identify Wireless Devices at Crime Scene | |
Unit 8 | 08 - Features of a Good Wireless Fornensics Tool | |
Unit 9 | 09 - Close | |
Module 17 | Investigating Web Attacks | |
Unit 1 | 01 - Investigating Web Attacks | |
Unit 2 | 02 - Introduction To Web Applications | |
Unit 3 | 03 - Web Attacks | |
Unit 4 | 04 - Unvalidated Input | |
Unit 5 | 05 - Parameter_Form Tampering | |
Unit 6 | 06 - Injection Flaws | |
Unit 7 | 07 - SQL Injection Attacks | |
Unit 8 | 08 - Cross-Site Scripting | |
Unit 9 | 09 - Improper Error Handling | |
Unit 10 | 10 - Web Attack Investigation | |
Unit 11 | 11 - Investigating Cross-Site Scripting | |
Unit 12 | 12 - Investigating SQL Injection Attacks | |
Unit 13 | 13 - Close | |
Module 18 | Tracking Emails and Investigating Email Crimes | |
Unit 1 | 01 - Tracking Emails and Investigating Email Crimes | |
Unit 2 | 02 - SMTP Server | |
Unit 3 | 03 - POP3 and IMAP Servers | |
Unit 4 | 04 - E-mail Messgae | |
Unit 5 | 05 - Investigating E-mail Crime and Violations | |
Unit 6 | 06 - Examine E-mail Headers | |
Unit 7 | 07 - Analysing E-mail Headers | |
Unit 8 | 08 - Examining Additional Files | |
Unit 9 | 09 - Forensic Acquisition of E-mail Archive | |
Unit 10 | 10 - Deleted E-mail Recovery | |
Unit 11 | 11 - Forensic Tool Kit | |
Unit 12 | 12 - CAN-SPAM Act | |
Unit 13 | 13 - Close | |
Module 19 | Mobile Forensics | |
Unit 1 | 01 - Mobile Forensics | |
Unit 2 | 02 - Mobile Phone | |
Unit 3 | 03 - Mobile Phone Forensics | |
Unit 4 | 04 - Precautions to Be Taken Before Investigation | |
Unit 5 | 05 - Mobile Devices | |
Unit 6 | 06 - Close | |
Module 20 | Investigative Reports | |
Unit 1 | 01 - Investigative Reports | |
Unit 2 | 02 - Computer Forensics Report | |
Unit 3 | 03 - Features of a Good Report | |
Unit 4 | 04 - Computer Forensics Report Template | |
Unit 5 | 05 - Report Classification | |
Unit 6 | 06 - Attachments and Appendices | |
Unit 7 | 07 - Writing a Report Using FTK | |
Unit 8 | 08 - Close | |
Module 21 | Becoming an Expert Witness | |
Unit 1 | 01 - Becoming an Expert Witness | |
Unit 2 | 02 - What is an Expert Witness | |
Unit 3 | 03 - Technical vs. Expert Witness | |
Unit 4 | 04 - Preparing for Testimony | |
Unit 5 | 05 - Expert Witness Qualifications | |
Unit 6 | 06 - Importance of Resume | |
Unit 7 | 07 - Testifying in Court | |
Unit 8 | 08 - General Ethics | |
Unit 9 | 09 - Helping Your Attorney | |
Unit 10 | 10 - Deposing | |
Unit 11 | 11 - Dealing with Media | |
Unit 12 | 12 - Close | |
Module 22 | Lab Introduction | |
Unit 1 | 01 - Lab Introduction | |
Unit 2 | 02 - Imaging with FTK Device | |
Unit 3 | 03 - Steganography Detection | |
Unit 4 | 04 - Network Attacks Network Miner and Wireshark | |
Unit 5 | 05 - Acquiring Memory Images |
Powered By WP Courseware