Module 1: Introduction to Computer Forensics
Module 2: Live System Forensics
- RAM Analysis
- Registry Analysis
- Live System Analysis
Module 3: Data Acquisition
- FTK Imager
- Linux dd
- FTK Imager
- Linux dd
Module 4: System Analysis
- Browser Forensics
- Steganography
- Password Cracking
- Metadata Analysis
- Email Investigation
- Browser Forensics
- Steganography
- Password Cracking
- Metadata Analysis
- Email Investigation
Module 5: Case Scenarios