Course Curriculum
-
01
Case Details
-
Introduction
-
Guided Questions
-
Case Study Forensic Image
-
Learning Outcomes
During this case you will learn how to investigate a system and locate evidence when the user encrypted some of their interesting files.
-
Investigating Windows Systems
-
Investigating a File System
-
Investigating a Compromised Windows System
Technical Requirements
For the hands-on labs in this case study
-
Any operating system of your choice
-
Internet Connection
-
A tool of your choice
What is next at Cyber 5W?
Add your email to the mailing list to get the latest updates.