| Atbildīgais | KLEDIA Group | 
|---|---|
| Pēdējoreiz atjaunots | 2025.05.30. | 
| Biedri | 1 | 
- 
                    Module 1: Computer Forensics in Today’s World4Lessons ·- 
        
        Understanding computer forensics
- 
        
        Cybercrime and its implications
- 
        
        Forensic investigation process
- 
        
        Legal and ethical issues
 
- 
        
        
- 
                    Module 2: Computer Forensics Investigation Process3Lessons ·- 
        
        Preparing for an investigation
- 
        
        Evidence acquisition and handling
- 
        
        Data analysis and reporting
 
- 
        
        
- 
                    Module 3: Understanding Hard Disks and File Systems3Lessons ·- 
        
        Hard disk architecture
- 
        
        File system overview (FAT, NTFS, EXT, etc.)
- 
        
        Disk partitioning and boot processes
 
- 
        
        
- 
                    Module 4: Data Acquisition and Duplication3Lessons ·- 
        
        Forensic imaging tools and techniques
- 
        
        Write protection methods
- 
        
        Validation and verification of data
 
- 
        
        
- 
                    Module 5: Defeating Anti-Forensics Techniques3Lessons ·- 
        
        Detection of data hiding (stenography, encryption, etc.)
- 
        
        Handling encrypted files
- 
        
        Dealing with password-protected files
 
- 
        
        
- 
                    Module 6: Windows Forensics3Lessons ·- 
        
        Windows artifacts (registry, event logs, prefetch, etc.)
- 
        
        Memory forensics
- 
        
        Timeline analysis
 
- 
        
        
- 
                    Module 7: Linux and Mac Forensics3Lessons ·- 
        
        Linux file systems and artifacts
- 
        
        Mac OS X forensics
- 
        
        Shell commands for forensic analysis
 
- 
        
        
- 
                    Module 8: Network Forensics3Lessons ·- 
        
        Investigating network traffic
- 
        
        Log analysis (firewall, IDS/IPS, proxy)
- 
        
        Wireless and cloud forensics
 
- 
        
        
- 
                    Module 9: Investigating Web Attacks5Lessons ·- 
        
        Web application attack forensics
- 
        
        Investigating email crimes
- 
        
        Social media forensics
- 
        
        Database log analysis
- 
        
        Cloud computing forensics challenges
 
- 
        
        
- 
                    Module 10: Dark Web Forensics3Lessons ·- 
        
        Tor network investigations
- 
        
        Cryptocurrency forensics
- 
        
        Dark web evidence collection
 
- 
        
        
- 
                    Module 11: Database Forensics2Lessons ·- 
        
        Database attack investigations
- 
        
        SQL injection forensics
 
- 
        
        
- 
                    Module 12: Cloud Forensics2Lessons ·- 
        
        Evidence collection from cloud environments
- 
        
        Legal aspects of cloud investigations
 
- 
        
        
- 
                    Module 13: Malware Forensics3Lessons ·- 
        
        Analyzing malicious software
- 
        
        Reverse engineering malware
- 
        
        Memory forensics for malware detection
 
- 
        
        
- 
                    Module 14: Investigating Email Crimes3Lessons ·- 
        
        Email header analysis
- 
        
        Phishing and spam investigation
- 
        
        Tracing email origins
 
- 
        
        
- 
                    Module 15: Mobile Forensics3Lessons ·- 
        
        Mobile device acquisition techniques
- 
        
        iOS and Android forensics
- 
        
        Mobile app investigations
 
- 
        
        
- 
                    Module 16: IoT Forensics3Lessons ·- 
        
        Challenges in IoT investigations
- 
        
        Smart device forensics
- 
        
        Vehicle forensics
 
- 
        
        
- 
                    Module 17: Forensic Report Writing and Presentation3Lessons ·- 
        
        Structuring a forensic report
- 
        
        Legal considerations in reporting
- 
        
        Expert testimony preparation
 
-