Course Curriculum
-
01
Introduction
-
Introduction to Anti-Forensics
-
-
02
Data Hiding
-
Data Hiding Techniques
-
-
03
Stenography
-
Stego Techniques
-
-
04
Crypto
-
Modern Crypto Techniques
-
-
05
File Systems
-
File System Anti-Forensic Techniques
-
-
06
Operating System & Memory
-
OS and Memory Anti-Forensics
-
-
07
Network
-
Network Anti-Forensics Techniques
-
-
08
Resources
-
Extra Reading
-
Learning Outcomes
After completing this course, you will learn the following.
-
Analyze the various anti-forensics techniques and processes that could be used to conceal and obscure digital evidence, such as data hiding, steganography, and encryption
-
Examine how anti-forensics techniques can be used to undermine the accuracy and reliability of digital evidence
-
Explore the defensive measures that can be employed to detect and uncover hidden data
-
Investigate the various cryptography and steganography techniques that are currently being used to conceal data and information in the wild
What is next at Cyber 5W?
Add your email to the mailing list to get the latest updates.