Course Curriculum

  • 01

    Case Details

    • Introduction

    • Guided Questions

    • Case Study Forensic Image

Learning Outcomes

During this case you will learn how to investigate a system and locate evidence when the user encrypted some of their interesting files.

  • Investigating Windows Systems

  • Investigating a File System

  • Investigating a Compromised Windows System

Technical Requirements

For the hands-on labs in this case study

  • Any operating system of your choice

  • Internet Connection

  • A tool of your choice

What is next at Cyber 5W?

Add your email to the mailing list to get the latest updates.