Course Curriculum
-
01
CASE DETAILS
-
Introduction
-
Guided Questions
-
Case Study Forensic Image
-
Learning Outcomes
During this case you will learn how to investigate a system and locate evidence when the user encrypted some of their interesting files.
-
Investigate different types of methods that can be used to encrypt files and find ways to decrypt them.
Technical Requirements
For the hands-on labs in this case study
-
Any operating system of your choice
-
Internet Connection
-
Any tool of your choice
What is next at Cyber 5W?
Add your email to the mailing list to get the latest updates.