Course Curriculum

  • 01

    CASE DETAILS

    • Introduction

    • Guided Questions

    • Case Study Forensic Image

Learning Outcomes

During this case you will learn how to investigate a system and locate evidence when the user encrypted some of their interesting files.

  • Investigate a Compromised Windows System

  • Recover Files from Unallocated Disk Space

  • Analyze Malware and Understand it’s Behavior

Technical Requirements

For the hands-on labs in this case study

  • Any operating system of your choice

  • Internet Connection

  • Any tool of your choice

What is next at Cyber 5W?

Add your email to the mailing list to get the latest updates.