Lesson 1: Digital Forensics and Cyber Crime with Kali Linux Fundamental
1. Introduction
2. Learning Objective
3. Why Forensics
4. Cyber Crime
5. Digital Forensics
6. Summary
Lesson 2: Digital Forensics Investigations
1. Learning Objective
2. Overview of Digital Forensics
3. Outsourcing vs. Providing in-house Forensics Services
4. Search and Seizure Overview
5. Basic Forensics Lab
6. Forensics Tool Overview
7. Collecting Evidence
8. Steganography and Images
9. Preserving and Reviewing Digital Evidence
10. Packaging Evidence
11. Forensics Report
12. Summary
Lesson 3: Getting Started with a Forensics Linux Workstation
1. Learning Objective
2. Downloading Kali Linux
3. Installing Kali
4. Running Kali Linux Virtual Machine
5. Updating and Installing Forensics Package
6. Kali Linux as a Forensics Workstation
7. Summary
Lesson 4: Data Duplication and Data Protection
1. Learning Objective
2. Pre Duplication
3. Forensics Images
4. Image Types
5. RAID
6. Kali Disk Duplication
7. Windows Disk Duplication
8. Summary
Lesson 5: Collecting and Preserving Evidence
1. Learning Objective
2. Introduction to Collecting and Preserving Evidence
3. Hashing Validation
4. Preserving Data
5. Linux Tools
6. Summary
Lesson 6: Cracking Password
1. Learning Objective
2. Password Cracking Concepts
3. Password Cracking Tools
4. Windows Passwords
5. Linux and OSX Passwords
6. Summary
Lesson 7: Windows Forensics
1. Learning Objective
2. File System Overview
3. Windows Shortcut Files
4. Windows Recycle Bin
5. Windows Print Spool Files
6. Registry Part 1
7. Registry Part 2
8. Registry Organization
9. Registry Part 3
10. Registry Forensics
11. Registry Investigation
12. FTK Registry Viewer
13. Summary
Lesson 8: Network Forensics
1. Learning Objective
2. Network
3. Security Tools
4. Firewalls
5. Content Filtering
6. Breach and Honeypots
7. Network Access Control
8. Netflow
9. Data Loss Prevention
10. Network Attacks
11. Detecting Network Threats
12. Snort Part 1
13. Snort Part 2
14. Summary
Lesson 9: Email Forensics
1. Learning Objective
2. Email System and Clients
3. Investigating Email
4. Email Forensics Tools
5. Summary
Lesson 10: Reverse Malware Engineering
1. Learning Objective
2. Introduction to Malware Analysis
3. Static Analysis
4. Static Analysis Tools
5. Static Analysis PDF
6. Dynamic Analysis
7. Summary
Lesson 11: Forensics Case Studies
1. Investigating a Laptop for HR
2. Investigating a Network Breach
3. Investigating a Hard Drive from eBay
4. Complete Legal Example
5. Summary
6. Digital Forensics and Cyber Crime with Kali Linux Fundamental
0 comments:
Post a Comment