Computer Forensics Core Concepts
  • The World of Cybercrime Investigation
  • Subfields of Computer Forensics
  • Roles and Responsibilities of the Cybercrime Investigator
  • Computer Forensic Tools and Testing
  • Sources of Digital Evidence
  • Home Computer Setup for IFCI Labs
Forensic Acquisitions: Theory & Practice
  • Incident Response Triage and Forensic Acquisitons
  • Hashes - Digital Fingerprints
  • Lab1 - Hashing
  • Incident Responder's Forensic Acquisition Process
  • Different Approaches to Forensic Acquisition
  • Volatile Memory Acquisition
  • Lab2 - Forensic Acquisition Lab
File Systems, Data Structures, and File Deletion Recovery
  • Introduction to File Systems and Operating Systems
  • Data Structures
  • Slack Space and Deleted Files
  • File System Limitations
  • FAT File Systems
  • NTFS File Systems
  • File Carving and File Fragmentation
  • Lab 3 Deleted File Recovery
Email & Internet History Analysis
  • Email Analysis
  • Host and Web Based Email Extraction
  • Email Header Analyisis and Base64 Encoding
  • LAB 4 - Email Analysis
  • Internet Activity Analysis Introduction
  • Chrome and Firefox Analysis
  • Internet Explorer Analysis
  • Cookies, Cache, and IE Artifacts
  • URL Obfuscation
  • LAB 5 - Internet Activity Analysis
Windows System Forensic Artifacts - Part 1
  • Timeline Analysis
  • Time Zone Issues
  • Time Stamps
  • Non-Standard Timestamps and Timeline Antiforensics
  • MAC Time Triangulation
  • User Attribution and Analysis
  • Recycle Bin Analysis
  • Lab 6 - Recycle Bin Analysis
  • Link File Analysis
  • Other Locations of Interest
  • Lab 7 - Link File Analysis
Windows System Forensic Artifacts Part 2 and File Signature Analysis
  • Thumbs.db and Thumbcache Analysis
  • Prefetch File Analysis
  • Lab 8 - Prefetch File Analysis
  • Persistent RAM Files and System Restore Functions
  • File Signature Analysis
  • Lab 9 - File Signature Analysis
  • Metadata Analysis
  • Exif Data Analysis
  • Lab 10 - Exif Data Analysis
Module 7 - Windows System Logs & Registry Analysis
  • Windows Log Analysis
  • System and Application Event Log Analysis
  • Security Event Log Analysis
  • Dr Watson Logs
  • Lab 11 - Event Log Analysis
  • Introduction to the Windows Registry
  • Registry Analysis -USB Devices
  • Registry Analysis - NTUser.dat - Part 1
  • Registry Analysis - NTUser.dat - Part 2
  • Registry Analysis - Autostarts
  • Lab 12 - Registry Analysis
Introduction to Malware and Network Intrusions
  • The Hacking Process
  • Hacker Motivations
  • Hacker Strategies
  • Botnet Investigations
  • Drive-by Downloads
  • Malware Propagation
  • Polymorphism and Packers
  • Social Engineering
  • Rootkits
Network Data Analysis
  • Network Data Evidence and IP Addressing
  • TCP and UDP Communication Protocols
  • Network Communication and Ports
  • HTTP Analysis and DNS Poisioning
  • Network Scanners and Sniffers
Cybercrime, Cyber Terror, & Cyber Espionage Investigations
  • The Blurred Lines Between Cybercrime, Cyberwar, and Cyberespionage
  • The Intersection of Cybercrime and Cyberwar
  • Russian Organized Cybercrime
  • Supply Chain Interdiction
  • Criminal Domain Investigations
  • Domain and IP Address Investigation Tools
  • Lab 13 - Criminal Domain Investigations
  • Stuxnet
  • Point of Sale Server Attacks
  • Point of Sale Server- Malware
  • Point of Sale Server- Exfiltration
  • Point of Sale Server- Advanced Investigative Techniques
Volatile Memory Analysis
  • Volatile Memory Analysis Introduction