Course Modules
This course contains the following modules.
Module 1: Computer Forensics Introduction
- Intro To Course-Part1
- Intro To Course-Part2
- Intro To Course-Part3
- Intro To Course-Part4
- Intro To Course-Part5
- Intro To Forensics-Part1
- Intro To Forensics-Part2
- Intro To Forensics-Part3
- Intro To Forensics-Part4
- Intro To Forensics-Part5
- Intro To Forensics-Part6
- Intro To Forensics-Part7
- Intro To Forensics-Part8
Module 2: Forensics Investigation Process
- Forensics Investigation Process-Part1
- Forensics Investigation Process-Part2
- Forensics Investigation Process-Part3
- Forensics Investigation Process-Part4
- Forensics Investigation Process-Part5
- Forensics Investigation Process-Part6
- Forensics Investigation Process-Part7
- Forensics Investigation Process-Part8
- Forensics Investigation Process-Part9
- Forensics Investigation Process-Part10
Module 3: Searching and Seizing
- Searching And Seizing-Part1
- Searching And Seizing-Part2
- Searching And Seizing-Part3
- Searching And Seizing-Part4
- Searching And Seizing-Part5
Module 4: Digital Evidence
- Digital Evidence-Part1
- Digital Evidence-Part2
- Digital Evidence-Part3
- Digital Evidence-Part4
- Digital Evidence-Part5
- Digital Evidence-Part6
- Digital Evidence-Part7
Module 5: First Responder Procedures
- First Responder Procedures-Part1
- First Responder Procedures-Part2
- First Responder Procedures-Part3
- First Responder Procedures-Part4
- First Responder Procedures-Part5
- First Responder Procedures-Part6
- First Responder Procedures-Part7
- First Responder Procedures-Part8
Module 6: Forensics Lab
- Forensic Lab-Part1
- Forensic Lab-Part2
- Forensic Lab-Part3
- Forensic Lab-Part4
- Forensic Lab-Part5
Module 7: Hard Disks and File Systems
- Hard Disks And File Systems-Part1
- Hard Disks And File Systems-Part2
- Hard Disks And File Systems-Part3
- Hard Disks And File Systems-Part4
- Hard Disks And File Systems-Part5
- Hard Disks And File Systems-Part6
- Hard Disks And File Systems-Part7
- Hard Disks And File Systems-Part8
- Hard Disks And File Systems-Part9
- Hard Disks And File Systems-Part10
Module 8: Windows Forensics
- Windows Forensics-Part1
- Windows Forensics-Part2
- Windows Forensics-Part3
- Windows Forensics-Part4
- Windows Forensics-Part5
- Windows Forensics-Part6
- Windows Forensics-Part7
- Windows Forensics-Part8
- Windows Forensics-Part9
- Windows Forensics-Part10
Module 9: Data Acquisition and Duplication
- Data Acquisition And Duplication-Part1
- Data Acquisition And Duplication-Part2
- Data Acquisition And Duplication-Part3
- Data Acquisition And Duplication-Part4
- Data Acquisition And Duplication-Part5
- Data Acquisition And Duplication-Part6
- Data Acquisition And Duplication-Part7
Module 10: Recovering Deleted Files and Partitions
- Recovering Deleted Files And Partitions-Part1
- Recovering Deleted Files And Partitions-Part2
Module 11: Using Access Data FTK
- Using Access Data FTK And Special Steps-Part1
- Using Access Data FTK And Special Steps-Part2
- Using Access Data FTK And Special Steps-Part3
- Using Access Data FTK And Special Steps-Part4
- Using Access Data FTK And Special Steps-Part5
- Using Access Data FTK And Special Steps-Part6
- Using Access Data FTK And Special Steps-Part7
- Using Access Data FTK And Special Steps-Part8
Module 12: Using EnCase
- EnCase-Part1
- EnCase-Part2
- EnCase-Part3
Module 13: Steganography
- Stenography-Part1
- Stenography-Part2
- Stenography-Part3
- Stenography-Part4
Module 14: Password Crackers
- Passwords-Part1
- Passwords-Part2
- Passwords-Part3
- Passwords-Part4
Module 15: Log Correlation
- Log Correlation-Part1
- Log Correlation-Part2
- Log Correlation-Part3
- Log Correlation-Part4
- Log Correlation-Part5
- Log Correlation-Part6
Module 16: Network Forensics
- Network Forensics-Part1
- Network Forensics-Part2
- Network Forensics-Part3
- Network Forensics-Part4
Module 17: Wireless Attacks
- Wireless Attacks-Part1
- Wireless Attacks-Part2
- Wireless Attacks-Part3
Module 18: Web Attacks
- Web Attacks-Part1
- Web Attacks-Part2
- Web Attacks-Part3
- Web Attacks-Part4
- Web Attacks-Part5
- Web Attacks-Part6
- Web Attacks-Part7
- Web Attacks-Part8
Module 19: Email Crimes
- Email Crimes-Part1
- Email Crimes-Part2
- Email Crimes-Part3
- Email Crimes-Part4
Module 20: Mobile Investigation
- Mobile Investigation-Part1
- Mobile Investigation-Part2
- Mobile Investigation-Part3
- Mobile Investigation-Part4
- Mobile Investigation-Part5
Module 21: Investigative Reports
- Investigation Reports-Part1
- Investigation Reports-Part2
- Investigation Reports-Part3
- Investigation Reports-Part4
Module 22: Expert Witness
- Expert Witness-Part1
- Expert Witness-Part2
- Expert Witness-Part3