Course Curriculum

  • 01

    CASE DETAILS

    • Introduction

    • Guided Questions

    • Case Study Forensic Image

Learning Outcomes

During this case you will learn how to investigate a system and locate evidence when the user encrypted some of their interesting files.

  • Investigating Windows Systems

  • Investigating a System’s Memory

  • Investigating a Compromised Windows Web Server

Technical Requirements

For the hands-on labs in this case study

  • Any operating system of your choice

  • Internet Connection

  • Any tool of your choice

What is next at Cyber 5W?

Add your email to the mailing list to get the latest updates.