Detailed Course Outline
- Introduction to forensic computing and incident response
- Lifting of digital evidence and chain of custody
- Filesystems & data recovery
- Windows forensic
- Unix & Mac Forensic
- Memory forensic
- Password cracking
- Email investigation
- Steganography and image analysis
- Network forensic
- Analysis and correlation of logs
- Threat Hunting
- Smartphones forensics
- Creating an expert witness and expert report